US12309132B1 - Continuous universal trust architecture and method - Google Patents
Continuous universal trust architecture and method Download PDFInfo
- Publication number
- US12309132B1 US12309132B1 US18/771,253 US202418771253A US12309132B1 US 12309132 B1 US12309132 B1 US 12309132B1 US 202418771253 A US202418771253 A US 202418771253A US 12309132 B1 US12309132 B1 US 12309132B1
- Authority
- US
- United States
- Prior art keywords
- entity
- authentication
- entities
- trust
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/64—Routing or path finding of packets in data switching networks using an overlay routing layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- This disclosure relates generally to trust-based network technologies and services.
- Zero trust security provides network security in which no entity is trusted by default from inside or outside the network. Zero trust solutions work by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.
- Continuous trust refers to the notion of trust that develops and/or evolves over time as a result of continuing interactions.
- a system that provides contextual-based zero trust access may implement context-aware access controls that allow or authenticate access to protected resources after performing risk assessment based on security posture information; a continuous trust evaluation may then be implemented for each of the connected devices, users, and application instances in the operating environment.
- the system may start with zero trust and gradually increase the trust score of a subject based on analysis of the network data, identity information, and security posture information. The system may then increase or decrease the trust level for the subject based on a risk score determined using the security posture information.
- a system of this type is described in U.S. Publication No. 2022/0210173.
- a method for continuous “universal” trust leverages a core network that manages authentication set-up and continuous trust logic for all entities that use the network.
- the CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another.
- CUT authenticates both user and service independently and separately.
- the CUT engine applies one or more authentication factors to an entity, once again independently of factors that may be applied by the CUT entity to any other entity that uses the network.
- the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves.
- each of a pair of entities establishes trust through the core network, that trust is retained throughout the communication session that occurs between the pair.
- the notion of universality as provided for herein means that the trust is retained not just between the pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to other communications with the core network.
- a method of continuous universal trust is carried out in a network operating environment.
- the method begins by configuring a secure communication path between each of set of first entities, and a second entity, wherein all traffic and data flows between a first entity and the second entity pass through the secure communication path, which in this embodiment corresponds to the core network referenced above.
- all communications flow through the secure communication path, and each endpoint for a communication (e.g., between a given first entity and the second entity) is authenticated to the core network independently and continuously.
- each endpoint for a communication e.g., between a given first entity and the second entity
- the following sub-steps are then carried out.
- the authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle.
- the first entity is permitted to access the protected resource associated with the second entity via the secure communication path.
- a determination is then made whether the authentication requirement should be modified e.g., stepped-up, stepped-down, or the like.
- the authentication requirement is adjusted and then enforced for at least some remaining portion of the communication session.
- the above-described continuous trust establishment and enforcement is enabled for each of the first entities in the trust circle, and for the second entity, thereby providing for continuous universal trust with respect to all the traffic flows.
- a computing infrastructure for continuous and universal trust in a network operating environment, including the publicly-routable Internet.
- one or more first entities desire to obtain access to protected resources associated with one or more second entities.
- a subset of the first entities may be associated with one another in a trust circle, which is a logical entity over which a security policy is enforced.
- the infrastructure comprises a core network comprising a relay through which all traffic and data flows between any first entity and any second entity pass, together with a controller, which includes an authentication module, and a continuous trust engine.
- each first entity and each second entity are independently and separately authenticated to the core network.
- the controller For each communication session established between a first entity and a second entity, and in this embodiment, the controller is configured to: (i) determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, (ii) upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path; (iii) based on one or more authentication factors and other data, determining whether the authentication requirement should be modified; (iv) upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and (v) enforcing the adjusted authentication requirement for at least some remaining portion of the communication session.
- the above-described trust circle paradigm is enforced for all interactions of an entity with other entities, such that every entity on the core network is trusted and each entity's trust is universal, rather than being built and managed on a per-interaction or per-service based security model.
- FIG. 1 depicts a representative continuous universal trust architecture of this disclosure
- FIG. 2 depicts a visual representation of representative interactions among a user, the core network, and a service provider in the architecture depicted in FIG. 1 .
- the technique of this disclosure provides for a Continuous Universal Trust (CUT) architecture that enables permitted entities (e.g., users, user groups, machines, devices, applications and the like) to access protected resources (e.g., services, sites, other machines, and the like).
- the CUT is implemented in a core network positioned as an overlay on the publicly-accessible Internet, and preferably operates in a Software-as-a-Service manner.
- the core network is physically separated (in effect “air-gapped”) from the public Internet and runs as a separate and distinct network (as opposed to being an overlay), in which case communications to and from core network elements are enabled through an Internet bridge, as will be described further below.
- the core network may leverage a cloud computing infrastructure, and conceptually the core network sits in-between (as an intermediary) requesting entities and the protected resources (typically provided by third party service providers) that the entities are attempting to interact with.
- all (or substantially all) traffic intended for the destination entities e.g., third party service providers, machines, or the like
- the CUT architecture e.g., in an encrypted manner.
- This routing method and system together with the establishment and maintenance of trust between each entity and the CUT architecture directly (as opposed to between a particular requesting entity, and an associated destination entity), enables the providing of continuous trust, as will be described.
- the core network components themselves do not have access to the content portions of the traffic due to the encryption or like protection.
- the term “site” typically refers to a website (or some protected portion thereof), but the reference to a “site” should be broadly construed to refer to any protected resource available from a server or other computing entity.
- the resource may be the overall site, a service endpoint, a portion of a site, a web service, an application, a web page, a document or other file, another machine or computing device, or a single protected object.
- the requesting entity is a human being, that entity has an associated mobile or other computing device running one or more mobile applications (or “apps”) including in one embodiment the agent application (“agent”) of this disclosure, as will be described below.
- an agent is not required.
- the mobile device may be a smartphone, tablet or wearable, an IOT device or appliance, laptop or the like.
- the mobile app can be downloaded and installed via a mobile application delivery service, or it may be provided as a native application on the mobile device.
- the service provider likewise runs a CUT application that is referred to herein as a daemon.
- Each agent (on the end user client device) or daemon (on the target service provider computing system) typically is implemented in software, e.g., as a program, process, execution thread, or the like.
- the core network in the CUT comprises one or more trust-based services, each of which is typically implemented as a set of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services).
- the service is multi-tenant based, and it is provided on behalf of each service customer (an organization) that desires to enables end users to obtain secure access to the organization's protected resources, which may be hosted on one or more servers that are distinct from the core network (although this is not a limitation).
- the continuous trust provided by the solution herein typically is implemented as an adjunct to the organization's existing authentication process flow.
- an end user entity or device has an associated agent (that is a component of the CUT) and that is configured to execute in the user's device at a network interface therein, e.g., a local loopback interface.
- the agent the user of the device (or service in the case of a web site, IOT device, or any service or business account) registers that device (or other component) with the service, e.g., according to a Know Your Client (KYC) verification (or other identity management) scheme.
- KYC Know Your Client
- the particular manner by which the agent is registered to the service may vary and is not a limitation.
- Each registered user, service or device has an associated CUT Identifier.
- a typical device includes a browser.
- the agent has the capability to monitor “ambient” factors that operate in the background and that do not require active user interaction, as well as “active” factors that involve or do require active user interaction (e.g., login operations, user interface interactions, biometrics, data generated as a result of any challenge/response, and the like).
- ambient factors are quite varied and may include, without limitation, the following: the user's local operating environment including device characteristics, operating system, installed applications, application versions, scripts, and the like, the set of icons on the user's home screen of a mobile application, a set of bookmarks that has been established for a browser, a list of then-running processes on a device, a set of mouse movements generally, and other general or specific user behaviors that are not tied to some prompting, challenge or the like
- ambient factor data necessarily does not expose personally-identifiable (or the like) information (PII). This locally-captured ambient and active factors data is provided as telemetry to the core network.
- PII personally-identifiable
- the Continuous Universal Trust (CUT) architecture is accessible by multiple entities (typically end users, devices, services, enterprises or combinations thereof) that themselves are configured according to a “circle” construct.
- a “circle” (sometimes referred to as a “trust circle”) refers to a set of entities to which a particular continuous trust policy (or more generally a security policy) is applied by the CUT architecture.
- a circle may include all of the registered users, users group or other accounts of that enterprise and that are subject to a particular continuous trust policy that will be enforced (in the same manner) for all of the entities that comprise the circle.
- an end user client entity or any service or other entity participating in CUT, and that registers with the system, has an associated CUT Identifier, and this identifier has one or more profiles, each of which corresponds to a particular circle.
- a given CUT Identifier may be associated with multiple circles.
- the notion of trust with respect to the CUT architecture is built upon all interactions of an entity with other entities to provide for a universal trust paradigm.
- universal trust ensures that every entity on the network can be trusted (a global circle of trust), and each entity's trust is universal (a trust index or score for the entity is global). This trust is facilitated in the preferred embodiment by requiring each entity that operates in association with the CUT architecture to independently and separately authenticate itself to the core network and without regard to an authentication paradigm specific to a particular destination.
- the notion of universality as provided for herein means that the trust is retained not just between, for example a pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to all other communications with the core network.
- the core network facilitates authentication by the registered entities of a given circle to the protected resources defined by the circle's security policy, as well as enforcing continuous trust.
- continuous trust is enabled throughout a particular interaction session between a circle's registered user and a target service provider.
- the core network provides a registered user single sign-on (SSO) or other authentication services to facilitate the user's initial access to a target service provider, and then further enforces a continuous trust paradigm (as defined by the circle's security policy) as the user continues its interactions with the service provider during a session. Throughout this interaction, all traffic flows through the core network, but with all or part of the contents encrypted, as previously described.
- SSO registered user single sign-on
- FIG. 1 depicts the CUT architecture in a representative (but non-limiting) embodiment.
- the end user 100 seeking access to a protected resource associated with a service 102 has an associated agent 104
- the service provider that provides the service 102 has an associated daemon 106 .
- An application 101 executing on the end user device is any application functionality that generates a request for a protected resource located at the service 102 .
- a typical application is a web browser, mobile app, native application code, or the like.
- the core network 108 (sometime referred to herein as an orchestration layer) comprises a number of components including an authentication factors runtime 110 that receives and manages ambient and active factors data, an engine 112 that uses the authentication factor and other data to manage and control the continuous trust processing, typically according to a circle's security policy, a relay 114 (such as WireguardTM, a secure VPN protocol and tunneling software) through which traffic flows pass, a DNS proxy 116 to facilitate hostname-based access to the continuous trust architecture and to locate services within the core network, together with one or more back-end databases and data stores, and related services.
- an authentication factors runtime 110 that receives and manages ambient and active factors data
- an engine 112 that uses the authentication factor and other data to manage and control the continuous trust processing, typically according to a circle's security policy
- a relay 114 such as WireguardTM, a secure VPN protocol and tunneling software
- DNS proxy 116 to facilitate hostname-based access to the continuous trust architecture and to locate services within the core network, together with one
- databases and data stores include, for example: a key-value store 118 that stores authentication data, and a time-series database 120 that stores telemetry extracted from the traffic flows.
- an SDK 122 (or other such library) is provided to provide or facilitate one or more ancillary functions such as routing service traffic through the core, integrating identity management and other such services with the network, and to facilitate a third party service's leveraging of cores services.
- the SDK 122 typically is implemented as one or more application programming interfaces (APIs) to which third party service functions are hooked into the core network. Using these services, the SDK associates security profile(s) with circle(s) and their associated registered entities.
- APIs application programming interfaces
- the DNS proxy 116 interacts with other Domain Name Services (DNS) on the publicly-routable Internet 124 in a known manner.
- DNS Domain Name Services
- hostnames that trigger access to the CUT architecture are received by the DNS proxy 116 (and, as necessary, Internet DNS) to obtain IP addresses of orchestration layer components, such as the relay through which traffic flows.
- the CUT network itself is distinct from the Internet (as opposed to being an overlay), in which case an Internet bridge 125 is provided to provide a mechanism by which traffic flows enter and exit the core network, which in effect is air-gapped from the public Internet 124 otherwise.
- An example Internet bridge is a switch, router, proxy (e.g., Hyper), or the like.
- the end user 100 or the participating service 102 safely interacts (with other entities) on the core network as opposed to the Internet generally, thereby significantly reducing the exposure of the end user or the service to Internet-based threats and attacks. While it is preferred that the end user or service always use the core network, this is not a requirement; for example, the service 102 may interact with the CUT-registered end user 100 over the core network 108 while also interacting with other end users (who are not registered with the core network) directly. In the latter case, a return path (not depicted) is provided from the service (or the daemon) to the public Internet, possibly through the Internet bridge. As also noted above, while in the preferred embodiment all communications with the Internet (by the participating entities) occur through the Internet bridge, this is not required, e.g., when the CUT is configured as an overlay on top of the publicly-routable Internet.
- a representative relay is a secure VPN tunnel-based solution, such as Wireguard, although this is not a limitation.
- Wireguard provides a virtual network interface that has a unique public key (pkey) that is used to encrypt or decrypt the traffic at the tunnel endpoints. The pkey can also be used to facilitate validation of user identity, as will be described in further detail below.
- the traffic (or at least content portions thereof) is secured and delivered end-to-end with IPSec tunnels, HTTP/TCP with custom encryption, firewall-punching protocols (STUN, TURN, etc.) or the like depending on implementation.
- IPSec IPSec
- HTTP/TCP HTTP/TCP with custom encryption
- firewall-punching protocols STUN, TURN, etc.
- the authentication factors runtime 110 operating in conjunction with the engine 112 , provides initial and continuous authentication of the user or device during a given interaction session with the service provider.
- module 110 and engine 112 are sometimes referred to as a controller (or continuous trust controller).
- typically continuous authentication is based on authentication factors that are passed by the agent 104 , such as one or more ambient factors, one or more active factors, or combinations thereof, as well as telemetry 113 extracted from the traffic flow(s).
- the telemetry 113 is collected as time-series data in the time-series database 120 and provided to the engine 112 for processing according to the security policy provided from the SDK 122 .
- the agent may be instructed to increase the number of authentication factors that it provides to the authentication module (for evaluation of the entity's continued right to have access), or the daemon may be structured to block the session from proceeding further.
- the engine is configured to dynamically change a given authentication requirement during an interaction session.
- a first authentication requirement e.g., weak authentication
- a second authentication requirement e.g., a somewhat higher authentication
- the nature and scope of this authentication step-up in this example depends on the policy, the telemetry, and perhaps other factors (e.g., time of day, client location, service load, and others).
- the engine may then determine to step-up the authentication requirement to an even higher level, e.g., because of the nature or type of follow-on request being made by the client.
- Another example would be the authentication requirement being stepped-up, but then later returned to a lower authentication requirement. All of these examples are merely illustrative.
- the engine Upon the initial authentication request, and/or whenever the engine determines that the authentication requirement should change, the engine receives the session, circle and user identifiers (and any associated PKC values), and makes the determination(s) about the nature and type of authentication requirement(s) that are then enforced (or continued to be enforced) by the system for the on-going session. To this end, the engine computes a set of trust indexes (also referred to herein as scores), typically one trust index per authentication factor, and uses this scoring data to determine if, when and to what degree the authentication requirement should be adjusted to maintain the continuous trust.
- scores typically one trust index per authentication factor
- a tunnel established between an end user and a service may have an associated unique public key (pkey).
- FIG. 1 depicts the public key being used.
- this key may be leveraged to validate user identity. For example, assume that during a particular interaction or session the system determines or reaches a “lower confidence” in the user's identity. At this point, an agent that has access to the pkey can trigger processing of an ambient (or even an active) authentication factor, thus enabling the system to associated identity with the pkey. (As a variant, some other local key may be tied to the user's identity, or a key exchange may be used).
- the service daemon uses the pkey to both decrypt the traffic and to validate that that the traffic indeed originated from the identity. How the pkey is transmitted to the daemon is implementation-specific.
- FIG. 2 depicts a typical session among the user and the service provider, with traffic flows through the core.
- a session typically involves a one or more client requests directed to the service provider service 202 , and one or more responses to the one or more client requests directed to the client (from the service).
- the UML diagram depicted shows a single request, and an associated response. There is no requirement for a one-to-one correspondence between a request, and a response, or vice-versa.
- the request originates from application 201 and is intercepted by agent 204 operating on the device's loopback address in the usual case.
- an encrypted tunnel 226 is or has been established between the agent 204 on the client side, and the daemon 206 on the server-side.
- the tunnel is associated with a public key (pkey) uniquely associated to the virtual network interface of the tunnel that is associated with the agent-daemon pair. Typically, there is a distinct tunnel per agent-daemon.
- the agent 204 makes a request to the authentication module 210 , passing a message comprising ⁇ user/pass/src/pkey ⁇ , where “user” is an identifier associated with the user, “pass” is the user's password or other secret, “src” is a source identifier for the client entity (e.g., an IP address), and “pkey” is the tunnel public key.
- the authentication factors runtime module 210 checks the information against the key-value store (in FIG.
- the authentication module 210 notifies the agent 204 that the session (here, with the core network) is established.
- the agent 204 encrypts the original request and forwards the encrypted request, together with source identifier and a destination identifier associated with the service provider, to the relay 214 .
- the relay 214 provides the engine 212 a message comprising ⁇ src/dest/len/timestamp ⁇ , where “len” is the length in bytes of the encrypted request and associated metadata, and “timestamp” corresponds to a time at which the relay received that encrypted request.
- the relay 214 forward the encrypted request package (including the “src” and “dest” metadata) to the daemon 206 .
- the daemon responds by sending the engine 212 a message comprising ⁇ src/pkey/dest/timestamp/request body hash ⁇ , where “request body hash” is a hash value that the daemon has computed over the encrypted request.
- the request body hash typically is computed using a hash function such as MD5, SHA-1, or the like.
- the ⁇ id/session ⁇ message is periodically called and cached on the daemon 206 as a keep-alive indication for the session.
- the daemon 206 which has applied the public key and recovered the request (from the encrypted request), forwards that request to the service 202 in a message comprising ⁇ src/dest/request/id/session ⁇ .
- the service 202 responds to the daemon 206 with the response to the request. The nature of the response of course will depend on the request.
- the daemon then re-applies the encryption to the service response using the key to generate an encrypted response.
- the encrypted response is shown as being returned through the core network to the agent 204 , which in turn removes the encryption and passes the response (in the clear) back to the application 210 . This competes the request-response flow.
- the engine 212 performs the continuous trust analysis as indicated by the analysis operation at step (12).
- This is a continuous operation that, as noted above, takes into consideration the policy (circle), the authentication factors (ambient, actual, or combinations), the nature of a given request, the nature of a given response, other system, application or device metadata, and so forth, and that results in one or more control signals that maintain or modify the initial or continuing authentication requirement(s) for the given session, to thereby facilitate the continuous trust.
- One such control signal is depicted at step (13), as a BLOCK session signal provided by the engine 212 to the daemon 216 . This results (in this example) with a termination of the session.
- blocking the on-going session from continuing is just one or many possible authentication control options that include: no change, an authentication step-up, an authentication step-down, and combinations.
- the above-described architecture is configured for multi-tenancy, and is highly-scalable to handle large numbers of requests from large numbers of requesting entities.
- a continuous universal trust solution is then provided. Because preferably all traffic flows through the core network, and in addition to providing the per-session continuous authentication, the system can readily terminate sessions in the event of a cyber or other attack, and it can readily enforce circle policy compliance. Although it is described that all traffic flows occur through the core network, this may not always be possible, e.g., some video chat applications require peer-to-peer connectivity; in these circumstances, the system may whitelist certain of such applications while enforcing that the remaining traffic to and from a registered end user client and to and from a registered service provider otherwise flow through the network.
- the system be implemented with an “agent” or a “daemon,” as the functionality of these components may be built into or other integrated with the client or server, as the case may be.
- An “agent” that allows the system to collect and implement at least the ambient authentication factors greatly improves user experience, as this obviates one or more logins to the participating services.
- the use of a dedicated agent that hooks into and intercepts potentially the entire traffic profile to and from the end user client enables the system to carry out more detailed behavioral analysis that is then leveraged to provide the continuous authentication. Telemetry data is readily captured as it flows through the infrastructure, all within requiring explicit SDK calls from the service provider.
- the computing platform or infrastructure that provides the core network is managed and operated “as-a-service” by a service provider entity.
- the platform is accessible over the publicly-routed Internet at a particular domain, or sub-domain.
- the platform is a securely-connected infrastructure (typically via SSL/TLS connections), and that infrastructure includes data encrypted at rest, e.g., in an encrypted database, and in transit.
- the computing platform typically comprises a set of applications implemented as network-accessible services.
- One or more applications (services) may be combined with one another.
- An application (service) may be implemented using a set of computing resources that are co-located or themselves distributed.
- an application is implemented using one or more computing systems.
- the computing platform (or portions thereof) may be implemented in a dedicated environment, in an on-premises manner, as a cloud-based architecture, or some hybrid.
- the system may be implemented on-premises (e.g., in an enterprise network), in a cloud computing environment, or in a hybrid infrastructure.
- An individual end user or an autonomous application typically accesses the system using a user application executing on a computing device (e.g., mobile phone, tablet, laptop or desktop computer, Internet-connected appliance, etc.).
- a user application is a mobile application (app) that a user obtains from a publicly-available source, such as a mobile application storefront.
- the platform may be managed and operated by a service provider. Although typically the platform is network-accessible, e.g., via the publicly-routed Internet, the computing system may be implemented in a standalone or on-premises manner.
- one or more of the identified components may interoperate with some other enterprise computing system or application.
- Authentication step-up or step-down determinations made by the engine may leverage machine learning.
- the core network includes a machine learning system.
- ML Machine Learning
- the nature and type of Machine Learning (ML) algorithms that are used for determining whether changes to the continuous authentication should be implemented may vary.
- ML algorithms iteratively learn from the data, thus allowing the system to find hidden insights without being explicitly programmed where to look.
- ML tasks are typically classified into various categories depending on the nature of the learning signal or feedback available to a learning system, namely supervised learning, unsupervised learning, and reinforcement learning.
- supervised learning the algorithm trains on labeled historic data and learns general rules that map input to output/target.
- the discovery of relationships between the input variables and the label/target variable in supervised learning is done with a training set, and the system learns from the training data.
- a test set is used to evaluate whether the discovered relationships hold and the strength and utility of the predictive relationship is assessed by feeding the model with the input variables of the test data and comparing the label predicted by the model with the actual label of the data.
- the most widely used supervised learning algorithms are Support Vector Machines, linear regression, logistic regression, naive Bayes, and neural networks.
- cloud computing is a model of service delivery for enabling on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service.
- configurable computing resources e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services
- SaaS Software as a Service
- PaaS Platform as a service
- IaaS Infrastructure as a Service
- the platform may comprise co-located hardware and software resources, or resources that are physically, logically, virtually and/or geographically distinct.
- Communication networks used to communicate to and from the platform services may be packet-based, non-packet based, and secure or non-secure, or some combination thereof.
- a representative machine on which the software executes comprises commodity hardware, an operating system, an application runtime environment, and a set of applications or processes and associated data, which provide the functionality of a given system or subsystem.
- the functionality may be implemented in a standalone machine, or across a distributed set of machines.
- a client device is a mobile device, such as a smartphone, tablet, or wearable computing device, laptop or desktop.
- a typical mobile device comprises a CPU (central processing unit), computer memory, such as RAM, and a drive.
- the device software includes an operating system (e.g., Google® AndroidTM, or the like), and generic support applications and utilities.
- the device may also include a graphics processing unit (GPU).
- the mobile device also includes a touch-sensing device or interface configured to receive input from a user's touch and to send this information to processor.
- the touch-sensing device typically is a touch screen.
- the mobile device comprises suitable programming to facilitate gesture-based control, in a manner that is known in the art.
- the mobile device is any wireless client device, e.g., a cellphone, pager, a personal digital assistant (PDA, e.g., with GPRS NIC), a mobile computer with a smartphone client, network-accessible Internet of Things (IOT) device, or the like.
- PDA personal digital assistant
- IOT Internet of Things
- Other mobile devices in which the technique may be practiced include any access protocol-enabled device (e.g., an AndroidTM-based device, or the like) that is capable of sending and receiving data in a wireless manner using a wireless protocol.
- Typical wireless protocols are: WiFi, GSM/GPRS, CDMA or WiMax.
- These protocols implement the ISO/OSI Physical and Data Link layers (Layers 1 & 2 ) upon which a traditional networking stack is built, complete with IP, TCP, SSL/TLS and HTTP.
- Each above-described process preferably is implemented in computer software as a set of program instructions executable in one or more processors, as a special-purpose machine.
- This apparatus may be a particular machine that is specially constructed for the required purposes, or it may comprise a computer otherwise selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including an optical disk, a CD-ROM, and a magnetic-optical disk, a read-only memory (ROM), a random access memory (RAM), a magnetic or optical card, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
- a given implementation of the computing platform is software that executes on a hardware platform running an operating system such as Linux.
- a machine implementing the techniques herein comprises a hardware processor, and non-transitory computer memory holding computer program instructions that are executed by the processor to perform the above-described methods.
- the functionality may be implemented with other application layer protocols besides HTTP/HTTPS, or any other protocol having similar operating characteristics.
- Any computing entity may act as the client or the server.
- the platform functionality may be co-located or various parts/components may be separately and run as distinct functions, perhaps in one or more locations (over a distributed network).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A method for continuous “universal” trust (CUT) leverages a core network that manages authentication set-up and continuous trust logic for entities that use the network. During communications through the network, and regardless of source or destination, CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another. In a typical implementation involving a user and a service, CUT authenticates both user and service independently. To facilitate both initial and continuous authentication, a CUT engine applies authentication factors to an entity, independently of factors that may be applied by the CUT entity to any other entity that uses the network. In this solution, the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves.
Description
This disclosure relates generally to trust-based network technologies and services.
Conventional network security has focused on network perimeter defenses, but many organizations no longer have a clearly-defined network perimeter. Remote work environments and the extensive use of mobile computing devices have dissolved traditional network boundaries. To protect a modern digital enterprise, organizations need a comprehensive strategy for secure access to their corporate resources, regardless of where they are located or how they are configured. To address this need, a security model, known as zero trust, has been developed. Zero trust security provides network security in which no entity is trusted by default from inside or outside the network. Zero trust solutions work by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.
Current tools and security technologies (e.g., login methods, Multiple Factor Authentication (MFA), CAPTCHA, behavioral-based and other solutions, whether basic or advanced) typically operate to facilitate trust/authentication per specific interaction, or set of interactions (i.e., a session), between a particular source (e.g., a user) and a particular destination (e.g., a service). Common implementations of such solutions, such as gateways, are positioned at or in association with the destination's premises, and they operate to identify and authenticate pre-defined users/connections that are targeting the specific service.
Continuous trust refers to the notion of trust that develops and/or evolves over time as a result of continuing interactions. For example, a system that provides contextual-based zero trust access may implement context-aware access controls that allow or authenticate access to protected resources after performing risk assessment based on security posture information; a continuous trust evaluation may then be implemented for each of the connected devices, users, and application instances in the operating environment. In this approach, the system may start with zero trust and gradually increase the trust score of a subject based on analysis of the network data, identity information, and security posture information. The system may then increase or decrease the trust level for the subject based on a risk score determined using the security posture information. A system of this type is described in U.S. Publication No. 2022/0210173.
While continuous trust solutions provide advantages, typically they are implemented on a per-site basis, and they are designed to operate within or in association with given network domains.
According to this disclosure, a method for continuous “universal” trust (CUT) leverages a core network that manages authentication set-up and continuous trust logic for all entities that use the network. During all communications through the network (e.g., through a dedicated CUT engine), and regardless of source or destination, the CUT logic is applied to each entity independently, and without requiring authentication to be done directly between entities that desire to communicate with one another. Thus, in a typical implementation involving a user and a service, CUT authenticates both user and service independently and separately. To facilitate both initial and continuous authentication, the CUT engine applies one or more authentication factors to an entity, once again independently of factors that may be applied by the CUT entity to any other entity that uses the network. In this solution, the CUT engine continues to authenticate and maintain trust between each entity and the core network, irrespective of the underlying communication to be carried out or occurring between the entities themselves. Thus, if each of a pair of entities establishes trust through the core network, that trust is retained throughout the communication session that occurs between the pair. Further, the notion of universality as provided for herein means that the trust is retained not just between the pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to other communications with the core network.
According to a more specific aspect, a method of continuous universal trust is carried out in a network operating environment. The method begins by configuring a secure communication path between each of set of first entities, and a second entity, wherein all traffic and data flows between a first entity and the second entity pass through the secure communication path, which in this embodiment corresponds to the core network referenced above. As explained, preferably all communications flow through the secure communication path, and each endpoint for a communication (e.g., between a given first entity and the second entity) is authenticated to the core network independently and continuously. During a communication session originating at each first entity and directed to the second entity, the following sub-steps are then carried out. Initially, a determination is made whether an authentication requirement associated with a permitted access to a protected resource has been met. The authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle. Upon a determination that the authentication requirement has been met, the first entity is permitted to access the protected resource associated with the second entity via the secure communication path. Based on one or more authentication factors and other data, and while the communication session persists, a determination is then made whether the authentication requirement should be modified (e.g., stepped-up, stepped-down, or the like). Upon a determination that the authentication factor should be modified, the authentication requirement is adjusted and then enforced for at least some remaining portion of the communication session.
Preferably, the above-described continuous trust establishment and enforcement is enabled for each of the first entities in the trust circle, and for the second entity, thereby providing for continuous universal trust with respect to all the traffic flows.
According to another aspect, a computing infrastructure is provided for continuous and universal trust in a network operating environment, including the publicly-routable Internet. In this environment, one or more first entities desire to obtain access to protected resources associated with one or more second entities. A subset of the first entities may be associated with one another in a trust circle, which is a logical entity over which a security policy is enforced. The infrastructure comprises a core network comprising a relay through which all traffic and data flows between any first entity and any second entity pass, together with a controller, which includes an authentication module, and a continuous trust engine. Preferably, each first entity and each second entity are independently and separately authenticated to the core network. For each communication session established between a first entity and a second entity, and in this embodiment, the controller is configured to: (i) determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, (ii) upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path; (iii) based on one or more authentication factors and other data, determining whether the authentication requirement should be modified; (iv) upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and (v) enforcing the adjusted authentication requirement for at least some remaining portion of the communication session.
Generalizing, in a preferred embodiment, the above-described trust circle paradigm is enforced for all interactions of an entity with other entities, such that every entity on the core network is trusted and each entity's trust is universal, rather than being built and managed on a per-interaction or per-service based security model.
As noted above, the technique of this disclosure provides for a Continuous Universal Trust (CUT) architecture that enables permitted entities (e.g., users, user groups, machines, devices, applications and the like) to access protected resources (e.g., services, sites, other machines, and the like). In one embodiment, the CUT is implemented in a core network positioned as an overlay on the publicly-accessible Internet, and preferably operates in a Software-as-a-Service manner. In a variant embodiment, the core network is physically separated (in effect “air-gapped”) from the public Internet and runs as a separate and distinct network (as opposed to being an overlay), in which case communications to and from core network elements are enabled through an Internet bridge, as will be described further below. In either case, the core network may leverage a cloud computing infrastructure, and conceptually the core network sits in-between (as an intermediary) requesting entities and the protected resources (typically provided by third party service providers) that the entities are attempting to interact with. According to a first aspect of this disclosure, all (or substantially all) traffic intended for the destination entities (e.g., third party service providers, machines, or the like), and typically all responses from the destination entities and intended for the requesting entities, is routed through the CUT architecture, e.g., in an encrypted manner. This routing method and system, together with the establishment and maintenance of trust between each entity and the CUT architecture directly (as opposed to between a particular requesting entity, and an associated destination entity), enables the providing of continuous trust, as will be described. While all traffic is routed through the core in this paradigm, preferably the core network components themselves (including any CUT system operator(s)) do not have access to the content portions of the traffic due to the encryption or like protection.
As used herein, the term “site” typically refers to a website (or some protected portion thereof), but the reference to a “site” should be broadly construed to refer to any protected resource available from a server or other computing entity. The resource may be the overall site, a service endpoint, a portion of a site, a web service, an application, a web page, a document or other file, another machine or computing device, or a single protected object. When the requesting entity is a human being, that entity has an associated mobile or other computing device running one or more mobile applications (or “apps”) including in one embodiment the agent application (“agent”) of this disclosure, as will be described below. In a variant embodiment, an agent is not required. The mobile device may be a smartphone, tablet or wearable, an IOT device or appliance, laptop or the like. The mobile app can be downloaded and installed via a mobile application delivery service, or it may be provided as a native application on the mobile device. Just as the entity seeking the protected resource (at a third party service provider) runs an agent application, the service provider likewise runs a CUT application that is referred to herein as a daemon. Each agent (on the end user client device) or daemon (on the target service provider computing system) typically is implemented in software, e.g., as a program, process, execution thread, or the like.
In another embodiment, a source or requesting entity is a computing machine that runs the agent, and a target or destination entity is a computing machine that runs the daemon. Thus, machine-to-machine interactions through the CUT architecture are also enabled.
In a more specific embodiment, the core network in the CUT comprises one or more trust-based services, each of which is typically implemented as a set of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services). Typically, the service is multi-tenant based, and it is provided on behalf of each service customer (an organization) that desires to enables end users to obtain secure access to the organization's protected resources, which may be hosted on one or more servers that are distinct from the core network (although this is not a limitation). As will be described, the continuous trust provided by the solution herein typically is implemented as an adjunct to the organization's existing authentication process flow. As noted above, in one embodiment an end user entity or device has an associated agent (that is a component of the CUT) and that is configured to execute in the user's device at a network interface therein, e.g., a local loopback interface. To obtain the agent, the user of the device (or service in the case of a web site, IOT device, or any service or business account) registers that device (or other component) with the service, e.g., according to a Know Your Client (KYC) verification (or other identity management) scheme. The particular manner by which the agent is registered to the service may vary and is not a limitation. Each registered user, service or device has an associated CUT Identifier. A typical device includes a browser. Among other tasks, the agent has the capability to monitor “ambient” factors that operate in the background and that do not require active user interaction, as well as “active” factors that involve or do require active user interaction (e.g., login operations, user interface interactions, biometrics, data generated as a result of any challenge/response, and the like). Representative ambient factors are quite varied and may include, without limitation, the following: the user's local operating environment including device characteristics, operating system, installed applications, application versions, scripts, and the like, the set of icons on the user's home screen of a mobile application, a set of bookmarks that has been established for a browser, a list of then-running processes on a device, a set of mouse movements generally, and other general or specific user behaviors that are not tied to some prompting, challenge or the like To protect privacy, ambient factor data necessarily does not expose personally-identifiable (or the like) information (PII). This locally-captured ambient and active factors data is provided as telemetry to the core network.
According to a further aspect of this disclosure, the Continuous Universal Trust (CUT) architecture is accessible by multiple entities (typically end users, devices, services, enterprises or combinations thereof) that themselves are configured according to a “circle” construct. In this paradigm, a “circle” (sometimes referred to as a “trust circle”) refers to a set of entities to which a particular continuous trust policy (or more generally a security policy) is applied by the CUT architecture. Thus, and for a particular enterprise, a circle may include all of the registered users, users group or other accounts of that enterprise and that are subject to a particular continuous trust policy that will be enforced (in the same manner) for all of the entities that comprise the circle. As noted above, an end user client entity, or any service or other entity participating in CUT, and that registers with the system, has an associated CUT Identifier, and this identifier has one or more profiles, each of which corresponds to a particular circle. A given CUT Identifier may be associated with multiple circles.
Generalizing, and according to a preferred embodiment, the notion of trust with respect to the CUT architecture is built upon all interactions of an entity with other entities to provide for a universal trust paradigm. In this context, universal trust ensures that every entity on the network can be trusted (a global circle of trust), and each entity's trust is universal (a trust index or score for the entity is global). This trust is facilitated in the preferred embodiment by requiring each entity that operates in association with the CUT architecture to independently and separately authenticate itself to the core network and without regard to an authentication paradigm specific to a particular destination. Further, the notion of universality as provided for herein means that the trust is retained not just between, for example a pair of entities, but also universally across the core network. Thus, if a first entity independently (and separately from a second entity) has established trust with the core network, this trust is retained and applicable to all other communications with the core network.
As will be described, and according to a further important benefit herein, the core network facilitates authentication by the registered entities of a given circle to the protected resources defined by the circle's security policy, as well as enforcing continuous trust. Advantageously, and as will be further described, continuous trust is enabled throughout a particular interaction session between a circle's registered user and a target service provider. Thus, in a typical use case, the core network provides a registered user single sign-on (SSO) or other authentication services to facilitate the user's initial access to a target service provider, and then further enforces a continuous trust paradigm (as defined by the circle's security policy) as the user continues its interactions with the service provider during a session. Throughout this interaction, all traffic flows through the core network, but with all or part of the contents encrypted, as previously described.
In this example embodiment, the DNS proxy 116 interacts with other Domain Name Services (DNS) on the publicly-routable Internet 124 in a known manner. To this end, hostnames that trigger access to the CUT architecture are received by the DNS proxy 116 (and, as necessary, Internet DNS) to obtain IP addresses of orchestration layer components, such as the relay through which traffic flows. In this embodiment, the CUT network itself is distinct from the Internet (as opposed to being an overlay), in which case an Internet bridge 125 is provided to provide a mechanism by which traffic flows enter and exit the core network, which in effect is air-gapped from the public Internet 124 otherwise. An example Internet bridge is a switch, router, proxy (e.g., Hyper), or the like. With this arrangement, the end user 100 or the participating service 102, as the case may be, safely interacts (with other entities) on the core network as opposed to the Internet generally, thereby significantly reducing the exposure of the end user or the service to Internet-based threats and attacks. While it is preferred that the end user or service always use the core network, this is not a requirement; for example, the service 102 may interact with the CUT-registered end user 100 over the core network 108 while also interacting with other end users (who are not registered with the core network) directly. In the latter case, a return path (not depicted) is provided from the service (or the daemon) to the public Internet, possibly through the Internet bridge. As also noted above, while in the preferred embodiment all communications with the Internet (by the participating entities) occur through the Internet bridge, this is not required, e.g., when the CUT is configured as an overlay on top of the publicly-routable Internet.
Referring back to FIG. 1 , and as noted above, preferably all traffic originating from the client side and intended for the server-side, and vice-versa, during a session flows through the core network 108 and, in particular, through the relay 114 that is logically and physically positioned between the agent 104 and the daemon 106. As noted above, a representative relay is a secure VPN tunnel-based solution, such as Wireguard, although this is not a limitation. Wireguard provides a virtual network interface that has a unique public key (pkey) that is used to encrypt or decrypt the traffic at the tunnel endpoints. The pkey can also be used to facilitate validation of user identity, as will be described in further detail below. In an alternative embodiment, the traffic (or at least content portions thereof) is secured and delivered end-to-end with IPSec tunnels, HTTP/TCP with custom encryption, firewall-punching protocols (STUN, TURN, etc.) or the like depending on implementation. Generalizing, the nature and type of traffic that is delivered over end-to-end communication path should be broadly construed as covering any IP-based traffic regardless of the application layer, security wrapper, or the like.
Once again referring back to FIG. 1 , the authentication factors runtime 110, operating in conjunction with the engine 112, provides initial and continuous authentication of the user or device during a given interaction session with the service provider. Together, module 110 and engine 112 are sometimes referred to as a controller (or continuous trust controller). As depicted, and as will be described further below, typically continuous authentication is based on authentication factors that are passed by the agent 104, such as one or more ambient factors, one or more active factors, or combinations thereof, as well as telemetry 113 extracted from the traffic flow(s). The telemetry 113 is collected as time-series data in the time-series database 120 and provided to the engine 112 for processing according to the security policy provided from the SDK 122. As depicted by the arrows, and depending on the determination(s) made by the engine, the agent may be instructed to increase the number of authentication factors that it provides to the authentication module (for evaluation of the entity's continued right to have access), or the daemon may be structured to block the session from proceeding further.
More generally, and based on one or more authentication factors and/or the telemetry, the engine is configured to dynamically change a given authentication requirement during an interaction session. Thus, in one example, at the outset of a workflow, only a first authentication requirement (e.g., weak authentication) is enforced; as the workflow continues, the engine then determines that a second authentication requirement (e.g., a somewhat higher authentication) is then needed, e.g., to ensure continued compliance with the security policy. The nature and scope of this authentication step-up in this example depends on the policy, the telemetry, and perhaps other factors (e.g., time of day, client location, service load, and others). Even later, and as the session continues, the engine may then determine to step-up the authentication requirement to an even higher level, e.g., because of the nature or type of follow-on request being made by the client. This is just a representative example, as the change that occurs to the authentication requirements may be a step-down (a relaxation) of the authentication requirement. Another example would be the authentication requirement being stepped-up, but then later returned to a lower authentication requirement. All of these examples are merely illustrative. Upon the initial authentication request, and/or whenever the engine determines that the authentication requirement should change, the engine receives the session, circle and user identifiers (and any associated PKC values), and makes the determination(s) about the nature and type of authentication requirement(s) that are then enforced (or continued to be enforced) by the system for the on-going session. To this end, the engine computes a set of trust indexes (also referred to herein as scores), typically one trust index per authentication factor, and uses this scoring data to determine if, when and to what degree the authentication requirement should be adjusted to maintain the continuous trust.
As noted above, in one embodiment a tunnel established between an end user and a service may have an associated unique public key (pkey). FIG. 1 depicts the public key being used. In addition to its use for encryption and decryption, this key may be leveraged to validate user identity. For example, assume that during a particular interaction or session the system determines or reaches a “lower confidence” in the user's identity. At this point, an agent that has access to the pkey can trigger processing of an ambient (or even an active) authentication factor, thus enabling the system to associated identity with the pkey. (As a variant, some other local key may be tied to the user's identity, or a key exchange may be used). The service daemon then uses the pkey to both decrypt the traffic and to validate that that the traffic indeed originated from the identity. How the pkey is transmitted to the daemon is implementation-specific.
To complete the request-response flow, at step (9) the daemon 206, which has applied the public key and recovered the request (from the encrypted request), forwards that request to the service 202 in a message comprising {src/dest/request/id/session}. At step (10), the service 202 responds to the daemon 206 with the response to the request. The nature of the response of course will depend on the request. The daemon then re-applies the encryption to the service response using the key to generate an encrypted response. At step (11), the encrypted response is shown as being returned through the core network to the agent 204, which in turn removes the encryption and passes the response (in the clear) back to the application 210. This competes the request-response flow.
As also depicted in FIG. 2 , and during the request-response flow (which as noted above may involve one or more requests, and one or more responses), the engine 212 performs the continuous trust analysis as indicated by the analysis operation at step (12). This is a continuous operation that, as noted above, takes into consideration the policy (circle), the authentication factors (ambient, actual, or combinations), the nature of a given request, the nature of a given response, other system, application or device metadata, and so forth, and that results in one or more control signals that maintain or modify the initial or continuing authentication requirement(s) for the given session, to thereby facilitate the continuous trust. One such control signal is depicted at step (13), as a BLOCK session signal provided by the engine 212 to the daemon 216. This results (in this example) with a termination of the session. As noted above, blocking the on-going session from continuing is just one or many possible authentication control options that include: no change, an authentication step-up, an authentication step-down, and combinations.
As noted, the above-described architecture is configured for multi-tenancy, and is highly-scalable to handle large numbers of requests from large numbers of requesting entities. As the system scales out, a continuous universal trust solution is then provided. Because preferably all traffic flows through the core network, and in addition to providing the per-session continuous authentication, the system can readily terminate sessions in the event of a cyber or other attack, and it can readily enforce circle policy compliance. Although it is described that all traffic flows occur through the core network, this may not always be possible, e.g., some video chat applications require peer-to-peer connectivity; in these circumstances, the system may whitelist certain of such applications while enforcing that the remaining traffic to and from a registered end user client and to and from a registered service provider otherwise flow through the network.
As noted above, it is not required that the system be implemented with an “agent” or a “daemon,” as the functionality of these components may be built into or other integrated with the client or server, as the case may be. An “agent” that allows the system to collect and implement at least the ambient authentication factors greatly improves user experience, as this obviates one or more logins to the participating services. Also, the use of a dedicated agent that hooks into and intercepts potentially the entire traffic profile to and from the end user client enables the system to carry out more detailed behavioral analysis that is then leveraged to provide the continuous authentication. Telemetry data is readily captured as it flows through the infrastructure, all within requiring explicit SDK calls from the service provider.
Enabling Technologies
Typically, the computing platform or infrastructure that provides the core network is managed and operated “as-a-service” by a service provider entity. In one embodiment, the platform is accessible over the publicly-routed Internet at a particular domain, or sub-domain. The platform is a securely-connected infrastructure (typically via SSL/TLS connections), and that infrastructure includes data encrypted at rest, e.g., in an encrypted database, and in transit. The computing platform typically comprises a set of applications implemented as network-accessible services. One or more applications (services) may be combined with one another. An application (service) may be implemented using a set of computing resources that are co-located or themselves distributed. Typically, an application is implemented using one or more computing systems. The computing platform (or portions thereof) may be implemented in a dedicated environment, in an on-premises manner, as a cloud-based architecture, or some hybrid.
The system may be implemented on-premises (e.g., in an enterprise network), in a cloud computing environment, or in a hybrid infrastructure. An individual end user or an autonomous application, typically accesses the system using a user application executing on a computing device (e.g., mobile phone, tablet, laptop or desktop computer, Internet-connected appliance, etc.). In a typical use case, a user application is a mobile application (app) that a user obtains from a publicly-available source, such as a mobile application storefront. The platform may be managed and operated by a service provider. Although typically the platform is network-accessible, e.g., via the publicly-routed Internet, the computing system may be implemented in a standalone or on-premises manner. In addition, one or more of the identified components may interoperate with some other enterprise computing system or application.
Authentication step-up or step-down determinations made by the engine may leverage machine learning. Thus, in a variant embodiment, the core network includes a machine learning system. The nature and type of Machine Learning (ML) algorithms that are used for determining whether changes to the continuous authentication should be implemented may vary. As is known, ML algorithms iteratively learn from the data, thus allowing the system to find hidden insights without being explicitly programmed where to look. ML tasks are typically classified into various categories depending on the nature of the learning signal or feedback available to a learning system, namely supervised learning, unsupervised learning, and reinforcement learning. In supervised learning, the algorithm trains on labeled historic data and learns general rules that map input to output/target. The discovery of relationships between the input variables and the label/target variable in supervised learning is done with a training set, and the system learns from the training data. In this approach, a test set is used to evaluate whether the discovered relationships hold and the strength and utility of the predictive relationship is assessed by feeding the model with the input variables of the test data and comparing the label predicted by the model with the actual label of the data. The most widely used supervised learning algorithms are Support Vector Machines, linear regression, logistic regression, naive Bayes, and neural networks.
One or more functions of the computing platform of this disclosure may be implemented in a cloud-based architecture. As is well-known, cloud computing is a model of service delivery for enabling on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. Available services models that may be leveraged in whole or in part include: Software as a Service (SaaS) (the provider's applications running on cloud infrastructure); Platform as a service (PaaS) (the customer deploys applications that may be created using provider tools onto the cloud infrastructure); Infrastructure as a Service (IaaS) (customer provisions its own processing, storage, networks and other computing resources and can deploy and run operating systems and applications).
The platform may comprise co-located hardware and software resources, or resources that are physically, logically, virtually and/or geographically distinct. Communication networks used to communicate to and from the platform services may be packet-based, non-packet based, and secure or non-secure, or some combination thereof.
More generally, the techniques described herein are provided using a set of one or more computing-related entities (systems, machines, processes, programs, libraries, functions, or the like) that together facilitate or provide the described functionality described above. In a typical implementation, a representative machine on which the software executes comprises commodity hardware, an operating system, an application runtime environment, and a set of applications or processes and associated data, which provide the functionality of a given system or subsystem. As described, the functionality may be implemented in a standalone machine, or across a distributed set of machines.
Typically, but without limitation, a client device is a mobile device, such as a smartphone, tablet, or wearable computing device, laptop or desktop. A typical mobile device comprises a CPU (central processing unit), computer memory, such as RAM, and a drive. The device software includes an operating system (e.g., Google® Android™, or the like), and generic support applications and utilities. The device may also include a graphics processing unit (GPU). The mobile device also includes a touch-sensing device or interface configured to receive input from a user's touch and to send this information to processor. The touch-sensing device typically is a touch screen. The mobile device comprises suitable programming to facilitate gesture-based control, in a manner that is known in the art.
Generalizing, the mobile device is any wireless client device, e.g., a cellphone, pager, a personal digital assistant (PDA, e.g., with GPRS NIC), a mobile computer with a smartphone client, network-accessible Internet of Things (IOT) device, or the like. Other mobile devices in which the technique may be practiced include any access protocol-enabled device (e.g., an Android™-based device, or the like) that is capable of sending and receiving data in a wireless manner using a wireless protocol. Typical wireless protocols are: WiFi, GSM/GPRS, CDMA or WiMax. These protocols implement the ISO/OSI Physical and Data Link layers (Layers 1 & 2) upon which a traditional networking stack is built, complete with IP, TCP, SSL/TLS and HTTP.
Each above-described process preferably is implemented in computer software as a set of program instructions executable in one or more processors, as a special-purpose machine.
While the above describes a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary, as alternative embodiments may perform the operations in a different order, combine certain operations, overlap certain operations, or the like. References in the specification to a given embodiment indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic.
While the disclosed subject matter has been described in the context of a method or process, the subject matter also relates to apparatus for performing the operations herein. This apparatus may be a particular machine that is specially constructed for the required purposes, or it may comprise a computer otherwise selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including an optical disk, a CD-ROM, and a magnetic-optical disk, a read-only memory (ROM), a random access memory (RAM), a magnetic or optical card, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
A given implementation of the computing platform is software that executes on a hardware platform running an operating system such as Linux. A machine implementing the techniques herein comprises a hardware processor, and non-transitory computer memory holding computer program instructions that are executed by the processor to perform the above-described methods.
The functionality may be implemented with other application layer protocols besides HTTP/HTTPS, or any other protocol having similar operating characteristics.
There is no limitation on the type of computing entity that may implement the client-side or server-side of the connection. Any computing entity (system, machine, device, program, process, utility, or the like) may act as the client or the server.
While given components of the system have been described separately, one of ordinary skill will appreciate that some of the functions may be combined or shared in given instructions, program sequences, code portions, and the like. Any application or functionality described herein may be implemented as native code, by providing hooks into another application, by facilitating use of the mechanism as a plug-in, by linking to the mechanism, and the like.
The platform functionality may be co-located or various parts/components may be separately and run as distinct functions, perhaps in one or more locations (over a distributed network).
What is claimed follows below.
Claims (15)
1. A method of continuous and universal trust in a network operating environment, comprising:
configuring a secure communication path between each of a set of first entities, and a second entity, wherein each of the set of first entities and the second entity are each authenticated independently and separately from one another and all traffic and data flows between a first entity and the second entity pass through the secure communication path;
during a communication session originating by each first entity and directed to the second entity:
determining whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, wherein the authentication requirement is specified in a security policy associated with a trust circle, and wherein the set of first entities comprise a trust circle;
upon a determination that the authentication requirement has been met, permitting the first entity to access the protected resource associated with the second entity via the secure communication path;
based on one or more authentication factors and other data, determining whether the authentication requirement should be modified;
upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and
enforcing the adjusted authentication requirement for at least some remaining portion of the communication session;
wherein for, at least first and second first entities, authentication requirements are dynamically adjusted during the communication sessions with the second entity such that the first and second first entities have differing authentication requirements in their respective communication sessions.
2. The method as described in claim 1 , wherein the trust circle is associated with a security policy.
3. The method as described in claim 1 , further including registering each first entity of the set of first entities in the trust circle.
4. The method as described in claim 1 , wherein the authentication factors include one or more ambient authentication factors, one or more active authentication factors, and combinations thereof.
5. The method as described in claim 1 , wherein adjusting the authentication requirement is one of: maintaining the authentication requirement, an authentication step-up, and an authentication step-down.
6. The method as described in claim 1 , provided as-a-service.
7. The method as described in claim 1 , wherein the other data comprises telemetry collected in association with the first entity.
8. The method as described in claim 1 , wherein the traffic and data flows include a request for the protected resource, and a response to the request.
9. The method as described in claim 1 , wherein the request and the response are encrypted end-to-end through the secure communication path.
10. A computing infrastructure for continuous and universal trust in a network operating environment, comprising:
at least first and second first entities;
a second entity distinct from the at least first and second first entities; and
a core network configured to establish and maintain a secure communication path between the first or second first entity and the second entity, each of the first and second first entities and the second entity authenticated to the core network independently and separately from one another;
the core network comprising a relay through which all traffic and data flows between the first or second first entity and the second entity pass, and a controller, the controller configured for each respective first or second first entity to:
determine whether an authentication requirement associated with a permitted access to a protected resource associated with the second entity has been met, wherein the authentication requirement is specified in a security policy;
upon a determination that the authentication requirement has been met, permitting the respective first or second first entity to access the protected resource associated with the second entity via the secure communication path;
based on one or more authentication factors and other data, determining whether the authentication requirement should be modified;
upon a determination that the authentication factor should be modified, adjusting the authentication requirement; and
enforcing the adjusted authentication requirement for at least some remaining portion of the communication session;
wherein authentication requirements are dynamically adjusted during the communication sessions with the second entity such that the first and second first entities have differing authentication requirements in their respective communication sessions.
11. The computing infrastructure as described in claim 10 , wherein the first and second first entities and the second entity are organized in a trust circle associated with the security policy.
12. The computing infrastructure as described in claim 10 , wherein the core network is configured as an overlay network in association with the network operating environment.
13. The computing infrastructure as described in claim 10 , wherein the core network is configured as a standalone network in association with the network operating environment.
14. The computing infrastructure as described in claim 10 , wherein authentication requirements applied to the first first entity different from authentication requirements applied to the second first entity.
15. The computing infrastructure as described in claim 10 , wherein an authentication requirement is associated with one of: an ambient authentication factor, an active authentication factor, and a combination of an ambient authentication factor and an active authentication factor.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/771,253 US12309132B1 (en) | 2024-07-12 | 2024-07-12 | Continuous universal trust architecture and method |
| US19/211,829 US20260019409A1 (en) | 2024-07-12 | 2025-05-19 | Continuous universal trust architecture and method |
| PCT/US2025/037284 WO2026015803A1 (en) | 2024-07-12 | 2025-07-11 | Continuous universal trust architecture and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/771,253 US12309132B1 (en) | 2024-07-12 | 2024-07-12 | Continuous universal trust architecture and method |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US19/211,829 Division US20260019409A1 (en) | 2024-07-12 | 2025-05-19 | Continuous universal trust architecture and method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US12309132B1 true US12309132B1 (en) | 2025-05-20 |
Family
ID=95717338
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/771,253 Active US12309132B1 (en) | 2024-07-12 | 2024-07-12 | Continuous universal trust architecture and method |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12309132B1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2026015803A1 (en) * | 2024-07-12 | 2026-01-15 | Cortwo Corp. | Continuous universal trust architecture and method |
Citations (183)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040111398A1 (en) * | 2002-12-09 | 2004-06-10 | International Business Machines Corporation | Performance mechanism for presenting integrated information in a graphical user interface |
| US20050021964A1 (en) * | 2003-07-25 | 2005-01-27 | Bhavna Bhatnagar | Method and system for providing a circle of trust on a network |
| US20070136786A1 (en) * | 2005-12-08 | 2007-06-14 | Sun Microsystems, Inc. | Enabling identity information exchange between circles of trust |
| US20070143128A1 (en) * | 2005-12-20 | 2007-06-21 | Tokarev Maxim L | Method and system for providing customized recommendations to users |
| US20070180078A1 (en) * | 2006-01-30 | 2007-08-02 | Microsoft Corporation | Automated File Distribution |
| US20070297405A1 (en) | 2004-12-31 | 2007-12-27 | Liwen He | Method of Operating a Network |
| US20080083021A1 (en) * | 2006-10-02 | 2008-04-03 | Presenceid, Inc. | Systems and methods for delegating information technology authorization to at least one other person |
| US20080092223A1 (en) * | 2006-10-16 | 2008-04-17 | Aruba Wireless Networks | Per-user firewall |
| US20080130522A1 (en) * | 2006-11-30 | 2008-06-05 | Havoc Pennington | Protocol for sharing information in a trusted circle using peer to peer methodology |
| US20080228775A1 (en) * | 2007-03-15 | 2008-09-18 | Fatdoor, Inc. | Youth communities in a geo-spatial environment |
| US20080301779A1 (en) * | 2007-05-31 | 2008-12-04 | Neeraj Garg | Configuring Security Mechanisms Utilizing A Trust System |
| US20090094041A1 (en) * | 2007-10-09 | 2009-04-09 | Novell, Inc. | System and method for representing agreements as reputation |
| US20100071056A1 (en) * | 2008-09-18 | 2010-03-18 | Sun Microsystems, Inc. | Method and system for multi-protocol single logout |
| US20100107219A1 (en) * | 2008-10-29 | 2010-04-29 | Microsoft Corporation | Authentication - circles of trust |
| US7788700B1 (en) | 2002-05-15 | 2010-08-31 | Gerard A. Gagliano | Enterprise security system |
| US20100287600A1 (en) | 2009-05-11 | 2010-11-11 | International Business Machines Corporation | Assigning User Requests of Different Types or Protocols to a User by Trust Association Interceptors |
| US7836510B1 (en) * | 2004-04-30 | 2010-11-16 | Oracle America, Inc. | Fine-grained attribute access control |
| US7891001B1 (en) | 2005-08-26 | 2011-02-15 | Perimeter Internetworking Corporation | Methods and apparatus providing security within a network |
| US20110072274A1 (en) * | 2009-03-31 | 2011-03-24 | Topaz Systems, Inc. | Distributed system for multi-function secure verifiable signer authentication |
| US20120042160A1 (en) * | 2010-08-10 | 2012-02-16 | General Instrument Corporation | System and method for cognizant transport layer security (ctls) |
| US20120209970A1 (en) | 2011-02-15 | 2012-08-16 | Ebay Inc. | Systems and methods for facilitating user confidence over a network |
| US20120232945A1 (en) * | 2011-03-10 | 2012-09-13 | Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies | Lightweight privacy protection protocol, methods, and systems for rfid and sensor based logistics track and trace data sharing over business subcontracting relationships |
| US20120302212A1 (en) * | 2011-05-25 | 2012-11-29 | Critical Medical Solutions, Inc. | Secure mobile radiology communication system |
| US20130086669A1 (en) * | 2011-09-29 | 2013-04-04 | Oracle International Corporation | Mobile application, single sign-on management |
| US20130091582A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Content security in a social network |
| US20130185772A1 (en) * | 2012-01-12 | 2013-07-18 | Aventura Hq, Inc. | Dynamically updating a session based on location data from an authentication device |
| US20130191903A1 (en) * | 2012-01-20 | 2013-07-25 | Aventura Hq, Inc. | Dual factor authentication with a programmable terminal device |
| US20130195026A1 (en) * | 2012-01-27 | 2013-08-01 | Kerstin Johnsson | Centralized control of intra-cell device-to-device communication |
| US20130205373A1 (en) * | 2012-02-08 | 2013-08-08 | Aventura Hq, Inc. | Adapting authentication flow based on workflow events |
| US20130232543A1 (en) * | 2012-03-02 | 2013-09-05 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
| US20130252585A1 (en) * | 2006-05-25 | 2013-09-26 | Sean Moshir | Systems and methods for encrypted mobile voice communications |
| US20130311582A1 (en) * | 2012-05-18 | 2013-11-21 | University Of Florida Research Foundation, Incorporated | Maximizing circle of trust in online social networks |
| US20130332257A1 (en) * | 2012-06-08 | 2013-12-12 | Adobe Systems Incorporated | Sharing private devices for content rendering |
| US20140136349A1 (en) * | 2012-11-13 | 2014-05-15 | Apple Inc. | Transferring assets |
| US20140143826A1 (en) * | 2012-11-21 | 2014-05-22 | Apple Inc. | Policy-based techniques for managing access control |
| US20140164305A1 (en) * | 2012-12-11 | 2014-06-12 | Nuance Communications, Inc. | Systems and methods for virtual agent recommendation for multiple persons |
| US8832848B1 (en) * | 2012-07-26 | 2014-09-09 | Symantec Corporation | Systems and methods for content-aware access control |
| US20140282942A1 (en) * | 2013-03-15 | 2014-09-18 | Omer BERKMAN | Privacy preserving knowledge and factor possession tests for persistent authentication |
| US20140289528A1 (en) * | 2013-03-22 | 2014-09-25 | Davit Baghdasaryan | System and method for privacy-enhanced data synchronization |
| US20140359789A1 (en) * | 2013-05-30 | 2014-12-04 | Telecommunication Systems, Inc. | Trusted Circle Information Access Management User Interface |
| US8925053B1 (en) | 2012-02-24 | 2014-12-30 | Emc Corporation | Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities |
| US20150072654A1 (en) * | 2006-05-25 | 2015-03-12 | Kevin K. Moshir | Systems And Methods For Encrypted Mobile Voice Communications |
| US20150082396A1 (en) * | 2013-09-19 | 2015-03-19 | Oracle International Corporation | Privileged account plug-in framework - network - connected objects |
| US9077715B1 (en) * | 2006-03-31 | 2015-07-07 | Symantec Corporation | Social trust based security model |
| US20150207813A1 (en) * | 2012-02-01 | 2015-07-23 | Vorstack, Inc. | Techniques for sharing network security event information |
| US20150227728A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements |
| US20150227727A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
| US9213855B1 (en) * | 2014-06-02 | 2015-12-15 | Narus, Inc. | Trusted user circles |
| US20160013966A1 (en) * | 2014-07-11 | 2016-01-14 | Microsoft Technology Licensing, Llc | Device Circles |
| US20160028737A1 (en) * | 2013-09-20 | 2016-01-28 | Oracle International Corporation | Multiple resource servers interacting with single oauth server |
| US20160055324A1 (en) * | 2014-08-20 | 2016-02-25 | Motorola Mobility Llc | Context-Based Authentication Mode Selection |
| US20160135020A1 (en) * | 2013-05-20 | 2016-05-12 | Celltrust Corporation | System and method for tracking sms messages |
| US20160373932A1 (en) * | 2015-06-19 | 2016-12-22 | Apple Inc. | Electronic subscriber identity module management under multiple certificate authorities |
| US20160373352A1 (en) * | 2015-06-17 | 2016-12-22 | Brocade Communications Systems, Inc. | Configuration of load-sharing components of a network visibility router in a network visibility system |
| US9608964B2 (en) * | 2015-02-23 | 2017-03-28 | PrivApp, Inc. | Private application platform |
| US20170093899A1 (en) * | 2015-09-29 | 2017-03-30 | International Business Machines Corporation | Crowd-based detection of device compromise in enterprise setting |
| US20170093829A1 (en) * | 2015-09-25 | 2017-03-30 | Mcafee, Inc. | Cumulative authentication for step-up increased authentication factors |
| US20170111364A1 (en) * | 2015-10-14 | 2017-04-20 | Uber Technologies, Inc. | Determining fraudulent user accounts using contact information |
| US20170124506A1 (en) * | 2015-10-30 | 2017-05-04 | Zemcar, Inc. | Rules Based Driver Selection |
| US20170171231A1 (en) * | 2015-12-11 | 2017-06-15 | Brightpoint Security, Inc. | Computer Network Threat Assessment |
| US20170331826A1 (en) * | 2016-05-11 | 2017-11-16 | International Business Machines Corporation | Hybrid database access control in external-to-database security systems |
| US20170346823A1 (en) * | 2016-05-25 | 2017-11-30 | Bank Of America Corporation | Network of trusted users |
| US20180012433A1 (en) * | 2016-07-07 | 2018-01-11 | NextEv USA, Inc. | Vehicle identification or authentication |
| US20180077745A1 (en) * | 2015-04-15 | 2018-03-15 | Nec Corporation | Method for coordinating terminal-to-terminal communication via ad-hoc network and mobile communication network, and management server device in which said method is implemented |
| WO2018069566A1 (en) * | 2016-10-14 | 2018-04-19 | Nokia Technologies Oy | Method, device and system for validating sensitive user data transactions within trusted circle |
| US20180121646A1 (en) * | 2016-11-01 | 2018-05-03 | Ricoh Company, Ltd. | Information processing device, information processing system, and information processing method |
| US20180131692A1 (en) * | 2016-11-09 | 2018-05-10 | Idefend Ltd. | System and a method for applying dynamically configurable means of user authentication |
| US20180129797A1 (en) * | 2016-11-10 | 2018-05-10 | EyeVerify Inc. | Verified and private portable identity |
| US20180150890A1 (en) * | 2016-11-28 | 2018-05-31 | Sap Se | Trust circle through machine learning |
| US20180191501A1 (en) * | 2016-12-31 | 2018-07-05 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
| US20180278600A1 (en) * | 2016-01-19 | 2018-09-27 | Regwez, Inc. | Multi-factor masked access control system |
| US10110569B1 (en) * | 2015-04-08 | 2018-10-23 | CSuite Technologies, Inc. | Systems and methods of storing data on a cloud-based personal virtual server |
| US20180309570A1 (en) | 2017-04-21 | 2018-10-25 | Netgear, Inc. | Secure communication in network access points |
| US20180324197A1 (en) * | 2017-05-03 | 2018-11-08 | Servicenow, Inc. | Aggregating network security data for export |
| US20180324207A1 (en) * | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
| US20180332065A1 (en) * | 2017-05-11 | 2018-11-15 | International Business Machines Corporation | Authenticating an unknown device based on relationships with other devices in a group of devices |
| US20180332017A1 (en) * | 2017-05-11 | 2018-11-15 | International Business Machines Corporation | Authenticating a device based on communication patterns in a group of devices |
| US20180337911A1 (en) * | 2017-05-16 | 2018-11-22 | Apple Inc. | Techniques for verifying user intent and securely configuring computing devices |
| US10164982B1 (en) * | 2017-11-28 | 2018-12-25 | Cyberark Software Ltd. | Actively identifying and neutralizing network hot spots |
| US20190013948A1 (en) * | 2017-07-07 | 2019-01-10 | Microsoft Technology Licensing, Llc | Internet of things blockchain interface |
| US20190058992A1 (en) * | 2017-08-17 | 2019-02-21 | Bank Of America Corporation | Multifactor network authentication |
| US20190058702A1 (en) * | 2017-08-17 | 2019-02-21 | Bank Of America Corporation | Self-adjusting multifactor network authentication |
| US20190109839A1 (en) * | 2017-10-06 | 2019-04-11 | Bank Of America Corporation | Multi-level authentication system with persistent integration platform |
| US20190199813A1 (en) * | 2017-12-22 | 2019-06-27 | CircleIt LLC | Method and system for scheduling, indexing, categorizing, and triggering digital content and gifts for future delivery |
| US20190251765A1 (en) * | 2015-08-11 | 2019-08-15 | Schweitzer Engineering Laboratories, Inc. | Policy-managed physical access authentication |
| US20190272361A1 (en) * | 2018-03-01 | 2019-09-05 | Bank Of America Corporation | System and method for continuous and competitive authentication |
| US20190281465A1 (en) * | 2017-12-04 | 2019-09-12 | Kevin K Moshir | Blockchain for validating communications archiving |
| US20190311791A1 (en) * | 2018-04-04 | 2019-10-10 | Healthcard LLC | System and method for patient-centric universal health recording and payment |
| US20190312871A1 (en) * | 2016-05-18 | 2019-10-10 | Salesforce.Com, Inc. | Environment-differentiated named credential instances for development and deployment |
| US20190325154A1 (en) * | 2019-06-28 | 2019-10-24 | Sudeep Divakaran | Hardware-assisted privacy protection using a secure user interface with multi-level access control of sensor data |
| US20190335002A1 (en) * | 2018-04-26 | 2019-10-31 | Verizon Patent And Licensing Inc. | Programmable user plane function |
| US20190342298A1 (en) * | 2018-05-02 | 2019-11-07 | Samsung Electronics Co., Ltd. | System and method for resource access authentication |
| US20190349469A1 (en) * | 2018-05-08 | 2019-11-14 | Apple Inc. | Managing device usage |
| US20190378078A1 (en) * | 2018-06-11 | 2019-12-12 | Intyrn Inc | Task delegation system |
| US20200004520A1 (en) * | 2018-06-29 | 2020-01-02 | Alibaba Group Holding Limited | One Click Application Asset Distribution |
| US20200007530A1 (en) * | 2018-06-28 | 2020-01-02 | Oracle International Corporation | Session Synchronization Across Multiple Devices in an Identity Cloud Service |
| US20200021591A1 (en) * | 2018-07-11 | 2020-01-16 | Cyberark Software Ltd. | Automated creation of dynamic privileged access resources |
| US20200052882A1 (en) * | 2018-08-10 | 2020-02-13 | International Business Machines Corporation | Secure environment device management |
| US20200074333A1 (en) * | 2018-08-30 | 2020-03-05 | Conduent Business Services, Llc | Method and system for dynamic trust model for personalized recommendation system in shared and non-shared economy |
| US20200117442A1 (en) * | 2018-10-10 | 2020-04-16 | Digital Alert Systems, Inc. | Method, system and program product for monitoring and managing emergency alert system devices |
| US20200145425A1 (en) | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for continuous authentication |
| US10673862B1 (en) * | 2016-12-07 | 2020-06-02 | Amazon Technologies, Inc. | Token-based access tracking and revocation |
| US20200196378A1 (en) * | 2016-03-18 | 2020-06-18 | Parallel Wireless, Inc. | Base Station Grouping for Topology Hiding |
| US10693914B2 (en) * | 2015-06-26 | 2020-06-23 | Micro Focus Llc | Alerts for communities of a security information sharing platform |
| US10701044B2 (en) * | 2015-06-26 | 2020-06-30 | Micro Focus Llc | Sharing of community-based security information |
| US10771572B1 (en) * | 2014-04-30 | 2020-09-08 | Twitter, Inc. | Method and system for implementing circle of trust in a social network |
| US20200322169A1 (en) * | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Accountable identities on the internet |
| US20200322330A1 (en) | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Continuous multi-factor authentication system |
| US20200322321A1 (en) * | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Continuous trust score |
| US20200382323A1 (en) * | 2019-06-03 | 2020-12-03 | Intuit Inc. | Centralized authentication and authorization with certificate management |
| US20200395107A1 (en) * | 2019-06-11 | 2020-12-17 | International Business Machines Corporation | Secure environment device management |
| US20200412541A1 (en) * | 2018-01-27 | 2020-12-31 | Redrock Biometrics Inc | Authentication ledger interactions for decentralized biometric authentication |
| US20210004454A1 (en) * | 2019-07-07 | 2021-01-07 | Apple Inc. | Proof of affinity to a secure event for frictionless credential management |
| US20210036865A1 (en) * | 2019-07-29 | 2021-02-04 | International Business Machines Corporation | Automatic form completion from a set of federated data providers |
| US10951606B1 (en) | 2019-12-04 | 2021-03-16 | Acceptto Corporation | Continuous authentication through orchestration and risk calculation post-authorization system and method |
| US10963842B1 (en) * | 2019-06-20 | 2021-03-30 | Intuit Inc. | Communication platform for email management |
| US20210124817A1 (en) * | 2019-10-25 | 2021-04-29 | EMC IP Holding Company LLC | Human trust api in a data confidence fabric |
| US20210160261A1 (en) * | 2019-11-21 | 2021-05-27 | International Business Machines Corporation | Device agnostic discovery and self-healing consensus network |
| US20210173910A1 (en) * | 2019-12-06 | 2021-06-10 | Bank Of America Corporation | Thermally enriched multi-modal and multi-channel biometric authentication |
| US20210218732A1 (en) * | 2020-01-09 | 2021-07-15 | Bank Of America Corporation | Client Side OTP Generation Method |
| US20210226944A1 (en) | 2020-01-22 | 2021-07-22 | Cisco Technology, Inc. | Method to bind a user and its devices: context fusion |
| US11095662B2 (en) * | 2017-08-29 | 2021-08-17 | Amazon Technologies, Inc. | Federated messaging |
| US20210306456A1 (en) * | 2020-03-24 | 2021-09-30 | Vamsee Dheeraj Kanagala | Intelligent telephone call blocking and management |
| US20210377056A1 (en) * | 2020-05-29 | 2021-12-02 | Apple Inc. | Secure sharing of credential information |
| US20210374709A1 (en) * | 2020-05-29 | 2021-12-02 | Apple Inc. | Creation of restricted mobile accounts |
| US20210385202A1 (en) * | 2020-06-04 | 2021-12-09 | Caliola Engineering, LLC | Secure wireless cooperative broadcast networks |
| US20210392048A1 (en) * | 2020-06-12 | 2021-12-16 | Strata Identity, Inc. | Systems, methods, and storage media for controlling identity information across multiple identity domains in a distributed identity infrastructure |
| US20220014359A1 (en) * | 2020-07-07 | 2022-01-13 | Curity Ab | Login and consent methodology that follows rest principles and uses the oauth protocol with attested clients |
| US20220012256A1 (en) * | 2018-10-10 | 2022-01-13 | Digital Alert Systems, Inc. | Method, system and program product for monitoring eas devices |
| US20220067669A1 (en) * | 2020-09-01 | 2022-03-03 | International Business Machines Corporation | Predictive device maintenance |
| US20220075695A1 (en) * | 2020-09-09 | 2022-03-10 | Thales Dis Usa, Inc | Backup and recovery of private information on edge devices onto surrogate edge devices |
| US20220078194A1 (en) * | 2020-09-08 | 2022-03-10 | Micro Focus Llc | Dynamic level authentication/encryption |
| US20220085984A1 (en) * | 2020-09-14 | 2022-03-17 | Amir Keyvan Khandani | Methods and apparatus for randomized encryption, with an associated randomized decryption |
| US20220094722A1 (en) * | 2020-09-24 | 2022-03-24 | Avaya Management L.P. | Methods and systems for maintaining conditional communication sessions using terminable authentication signals |
| US20220095116A1 (en) * | 2020-09-22 | 2022-03-24 | Apple Inc. | Device communication through high-frequency light encoding |
| US20220103568A1 (en) * | 2020-09-30 | 2022-03-31 | Denso Corporation | Authentication management method, authentication management program, and user authentication management device |
| US20220138692A1 (en) * | 2020-10-29 | 2022-05-05 | Medecision, Inc. | System and method for virtual project visits |
| US20220150313A1 (en) * | 2018-12-10 | 2022-05-12 | Parallels International Gmbh | System and method for remote application sharing |
| US20220166883A1 (en) * | 2017-01-20 | 2022-05-26 | Virtual Hold Technology Solutions, Llc | System and method for enhanced virtual queuing |
| US20220210173A1 (en) | 2020-12-31 | 2022-06-30 | Fortinet, Inc. | Contextual zero trust network access (ztna) based on dynamic security posture insights |
| US20220245222A1 (en) * | 2021-02-04 | 2022-08-04 | Dell Products L.P. | Baseboard management controller firmware security system |
| US11412003B1 (en) * | 2018-05-07 | 2022-08-09 | Amrock, Llc | Resource protection and verification with bidirectional notification architecture |
| US20220337631A1 (en) | 2021-04-15 | 2022-10-20 | Anamika Bhattacharya | System and method to create zero trust framework for security as a service |
| US11483316B1 (en) * | 2019-07-11 | 2022-10-25 | Workday, Inc. | System and method for access using a circle of trust |
| US20220360607A1 (en) * | 2021-05-10 | 2022-11-10 | Island Technology, Inc. | Enterprise browser system |
| US20220398319A1 (en) * | 2021-06-14 | 2022-12-15 | Dell Products, L.P. | Custom baseboard management controller (bmc) firmware stack monitoring system and method |
| US20220406304A1 (en) * | 2021-06-21 | 2022-12-22 | Kyndryl, Inc. | Intent driven voice interface |
| US20230054446A1 (en) * | 2013-11-01 | 2023-02-23 | Anonos Ip Llc | Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning |
| US20230170956A1 (en) * | 2021-12-01 | 2023-06-01 | Qualcomm Incorporated | Secret key extraction for line-of-sight communications |
| US20230179605A1 (en) * | 2021-12-03 | 2023-06-08 | Whatsapp Llc | Providing equal signing authority between multiple devices of a single user in an end-to-end encrypted messaging system |
| US20230222047A1 (en) * | 2022-01-11 | 2023-07-13 | International Business Machines Corporation | Methods and systems for managing as-a-service systems in the event of connectivity issues |
| US20230237349A1 (en) | 2011-03-04 | 2023-07-27 | Digital Consolidation, Inc. | Digital consolidation |
| US20230247003A1 (en) | 2014-06-20 | 2023-08-03 | Zscaler, Inc. | Zero trust private application access for government applications |
| US20230244775A1 (en) * | 2022-01-31 | 2023-08-03 | Salesforce.Com, Inc. | Verification of Automatic Responses to Authentication Requests on Authorized Mobile Devices |
| US20230251936A1 (en) * | 2022-02-10 | 2023-08-10 | Vinpower Inc. | Mobile device for protecting data stored in data backup device and data protection method thereof |
| US11743256B1 (en) * | 2019-11-05 | 2023-08-29 | Shape Security, Inc. | Security measures for extended sessions using multi-domain data |
| US20230300930A1 (en) * | 2022-01-31 | 2023-09-21 | Kyndryl, Inc. | Cognitive hotspot provisioning and network prioritization |
| US20230306428A1 (en) * | 2022-03-24 | 2023-09-28 | Bank Of America Corporation | Multi-Computer System with Dynamic Authentication for Optimized Queue Management Based on Facial Recognition |
| US20230336663A1 (en) * | 2009-01-28 | 2023-10-19 | Virtual Hold Technology Solutions, Llc | System and method for secure transitory data storage and management |
| US20230379350A1 (en) | 2022-05-20 | 2023-11-23 | Cisco Technology, Inc. | Continuous trusted access of endpoints |
| US20230379319A1 (en) * | 2022-05-20 | 2023-11-23 | Cisco Technology, Inc. | Secure access service edge function with configured metric collection intelligence |
| US20230384996A1 (en) * | 2022-05-31 | 2023-11-30 | Sharp Kabushiki Kaisha | Image forming apparatus and determination method in processing apparatus |
| US11838762B1 (en) | 2019-08-04 | 2023-12-05 | Secureauth Corporation | Method and system for identity verification and authorization of request by checking against an active user directory of identity service entities selected by an identity information owner |
| US11886607B1 (en) * | 2019-03-14 | 2024-01-30 | Change Healthcare Holdings, Llc | Apparatus and method configured to facilitate the selective search of a database |
| US20240040383A1 (en) | 2022-07-29 | 2024-02-01 | Cisco Technology, Inc. | Trust based continuous 5g service assessment |
| US20240073251A1 (en) * | 2022-08-25 | 2024-02-29 | Capital One Services, Llc | Authentication based on detection of user-specific authentication input errors |
| US11936671B1 (en) | 2023-06-26 | 2024-03-19 | Kolide, Inc. | Zero trust architecture with browser-supported security posture data collection |
| US20240098097A1 (en) * | 2015-12-22 | 2024-03-21 | Mcafee, Llc | Secure over-the-air updates |
| US20240098577A1 (en) * | 2022-09-19 | 2024-03-21 | Qualcomm Incorporated | Techniques for connected state mobility in a service-based wireless system |
| US20240152857A1 (en) * | 2022-11-04 | 2024-05-09 | Project44, Llc | Analyzing and Managing Shipping Data Across Jurisdictions and Regions |
| US11997219B1 (en) * | 2019-02-25 | 2024-05-28 | United Services Automobile Association (Usaa) | Network security for remote workers |
| US20240243904A1 (en) * | 2023-01-12 | 2024-07-18 | nTropy.io, Inc. | File construct for internet-of-things key material |
| US20240244068A1 (en) * | 2015-10-28 | 2024-07-18 | Qomplx Llc | System and methods for detecting authentication object forgery or manipulation attacks |
| US20240273066A1 (en) * | 2023-02-15 | 2024-08-15 | Varonis Systems, Inc. | Optimized file classification with supervised learning |
| US20240281796A1 (en) * | 2023-02-17 | 2024-08-22 | Artema Labs, Inc | Systems and Methods for Facilitating Digital Wallet-Based Transactions |
| US20240314551A1 (en) * | 2022-05-07 | 2024-09-19 | Nokia Technologies Oy | Security communication in prose u2n relay |
| US20240323034A1 (en) * | 2023-03-24 | 2024-09-26 | Srinivas Kumar | System and method for extended attributes in certificates for dynamic authorization |
| US12130941B2 (en) * | 2011-05-10 | 2024-10-29 | Nagravision Sàrl | Method for handling privacy data |
| US20240364730A1 (en) * | 2023-04-25 | 2024-10-31 | Ping Identity International, Inc. | Access prediction service serving explainable risk scores |
| US20240378423A1 (en) * | 2023-05-08 | 2024-11-14 | ForgeRock, Inc. | Explainable neural network for anomaly detection |
| US20240380575A1 (en) * | 2023-05-09 | 2024-11-14 | Apple Inc. | Server-Mediated Management of Accessory Device Sharing |
| US20240414061A1 (en) * | 2023-06-06 | 2024-12-12 | Vmware, Inc. | Conflict resolution between global and local network managers in a virtualized computing system |
| US12170669B2 (en) * | 2018-12-11 | 2024-12-17 | Visa International Service Association | Trust tokens for resource access |
-
2024
- 2024-07-12 US US18/771,253 patent/US12309132B1/en active Active
Patent Citations (186)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7788700B1 (en) | 2002-05-15 | 2010-08-31 | Gerard A. Gagliano | Enterprise security system |
| US20040111398A1 (en) * | 2002-12-09 | 2004-06-10 | International Business Machines Corporation | Performance mechanism for presenting integrated information in a graphical user interface |
| US20050021964A1 (en) * | 2003-07-25 | 2005-01-27 | Bhavna Bhatnagar | Method and system for providing a circle of trust on a network |
| US7836510B1 (en) * | 2004-04-30 | 2010-11-16 | Oracle America, Inc. | Fine-grained attribute access control |
| US20070297405A1 (en) | 2004-12-31 | 2007-12-27 | Liwen He | Method of Operating a Network |
| US7891001B1 (en) | 2005-08-26 | 2011-02-15 | Perimeter Internetworking Corporation | Methods and apparatus providing security within a network |
| US20070136786A1 (en) * | 2005-12-08 | 2007-06-14 | Sun Microsystems, Inc. | Enabling identity information exchange between circles of trust |
| US20070143128A1 (en) * | 2005-12-20 | 2007-06-21 | Tokarev Maxim L | Method and system for providing customized recommendations to users |
| US20070180078A1 (en) * | 2006-01-30 | 2007-08-02 | Microsoft Corporation | Automated File Distribution |
| US9077715B1 (en) * | 2006-03-31 | 2015-07-07 | Symantec Corporation | Social trust based security model |
| US20130252585A1 (en) * | 2006-05-25 | 2013-09-26 | Sean Moshir | Systems and methods for encrypted mobile voice communications |
| US20150072654A1 (en) * | 2006-05-25 | 2015-03-12 | Kevin K. Moshir | Systems And Methods For Encrypted Mobile Voice Communications |
| US7788708B2 (en) * | 2006-10-02 | 2010-08-31 | Presenceid, Inc. | Systems and methods for delegating information technology authorization to at least one other person |
| US20080083021A1 (en) * | 2006-10-02 | 2008-04-03 | Presenceid, Inc. | Systems and methods for delegating information technology authorization to at least one other person |
| US20080092223A1 (en) * | 2006-10-16 | 2008-04-17 | Aruba Wireless Networks | Per-user firewall |
| US20080130522A1 (en) * | 2006-11-30 | 2008-06-05 | Havoc Pennington | Protocol for sharing information in a trusted circle using peer to peer methodology |
| US20080228775A1 (en) * | 2007-03-15 | 2008-09-18 | Fatdoor, Inc. | Youth communities in a geo-spatial environment |
| US20080301779A1 (en) * | 2007-05-31 | 2008-12-04 | Neeraj Garg | Configuring Security Mechanisms Utilizing A Trust System |
| US20090094041A1 (en) * | 2007-10-09 | 2009-04-09 | Novell, Inc. | System and method for representing agreements as reputation |
| US20100071056A1 (en) * | 2008-09-18 | 2010-03-18 | Sun Microsystems, Inc. | Method and system for multi-protocol single logout |
| US20100107219A1 (en) * | 2008-10-29 | 2010-04-29 | Microsoft Corporation | Authentication - circles of trust |
| US20230336663A1 (en) * | 2009-01-28 | 2023-10-19 | Virtual Hold Technology Solutions, Llc | System and method for secure transitory data storage and management |
| US20110072274A1 (en) * | 2009-03-31 | 2011-03-24 | Topaz Systems, Inc. | Distributed system for multi-function secure verifiable signer authentication |
| US20100287600A1 (en) | 2009-05-11 | 2010-11-11 | International Business Machines Corporation | Assigning User Requests of Different Types or Protocols to a User by Trust Association Interceptors |
| US20120042160A1 (en) * | 2010-08-10 | 2012-02-16 | General Instrument Corporation | System and method for cognizant transport layer security (ctls) |
| US20120209970A1 (en) | 2011-02-15 | 2012-08-16 | Ebay Inc. | Systems and methods for facilitating user confidence over a network |
| US20230237349A1 (en) | 2011-03-04 | 2023-07-27 | Digital Consolidation, Inc. | Digital consolidation |
| US20120232945A1 (en) * | 2011-03-10 | 2012-09-13 | Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies | Lightweight privacy protection protocol, methods, and systems for rfid and sensor based logistics track and trace data sharing over business subcontracting relationships |
| US12130941B2 (en) * | 2011-05-10 | 2024-10-29 | Nagravision Sàrl | Method for handling privacy data |
| US20120302212A1 (en) * | 2011-05-25 | 2012-11-29 | Critical Medical Solutions, Inc. | Secure mobile radiology communication system |
| US20130086669A1 (en) * | 2011-09-29 | 2013-04-04 | Oracle International Corporation | Mobile application, single sign-on management |
| US20130091582A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Content security in a social network |
| US20130185772A1 (en) * | 2012-01-12 | 2013-07-18 | Aventura Hq, Inc. | Dynamically updating a session based on location data from an authentication device |
| US20130191903A1 (en) * | 2012-01-20 | 2013-07-25 | Aventura Hq, Inc. | Dual factor authentication with a programmable terminal device |
| US20130195026A1 (en) * | 2012-01-27 | 2013-08-01 | Kerstin Johnsson | Centralized control of intra-cell device-to-device communication |
| US20150207813A1 (en) * | 2012-02-01 | 2015-07-23 | Vorstack, Inc. | Techniques for sharing network security event information |
| US20130205373A1 (en) * | 2012-02-08 | 2013-08-08 | Aventura Hq, Inc. | Adapting authentication flow based on workflow events |
| US8925053B1 (en) | 2012-02-24 | 2014-12-30 | Emc Corporation | Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities |
| US20130232543A1 (en) * | 2012-03-02 | 2013-09-05 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
| US20130311582A1 (en) * | 2012-05-18 | 2013-11-21 | University Of Florida Research Foundation, Incorporated | Maximizing circle of trust in online social networks |
| US20130332257A1 (en) * | 2012-06-08 | 2013-12-12 | Adobe Systems Incorporated | Sharing private devices for content rendering |
| US8832848B1 (en) * | 2012-07-26 | 2014-09-09 | Symantec Corporation | Systems and methods for content-aware access control |
| US20140136349A1 (en) * | 2012-11-13 | 2014-05-15 | Apple Inc. | Transferring assets |
| US20140143826A1 (en) * | 2012-11-21 | 2014-05-22 | Apple Inc. | Policy-based techniques for managing access control |
| US20140164305A1 (en) * | 2012-12-11 | 2014-06-12 | Nuance Communications, Inc. | Systems and methods for virtual agent recommendation for multiple persons |
| US20140282942A1 (en) * | 2013-03-15 | 2014-09-18 | Omer BERKMAN | Privacy preserving knowledge and factor possession tests for persistent authentication |
| US20140289528A1 (en) * | 2013-03-22 | 2014-09-25 | Davit Baghdasaryan | System and method for privacy-enhanced data synchronization |
| US20160135020A1 (en) * | 2013-05-20 | 2016-05-12 | Celltrust Corporation | System and method for tracking sms messages |
| US20140359789A1 (en) * | 2013-05-30 | 2014-12-04 | Telecommunication Systems, Inc. | Trusted Circle Information Access Management User Interface |
| US20150082396A1 (en) * | 2013-09-19 | 2015-03-19 | Oracle International Corporation | Privileged account plug-in framework - network - connected objects |
| US20160028737A1 (en) * | 2013-09-20 | 2016-01-28 | Oracle International Corporation | Multiple resource servers interacting with single oauth server |
| US20230054446A1 (en) * | 2013-11-01 | 2023-02-23 | Anonos Ip Llc | Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning |
| US20160156609A1 (en) * | 2014-02-07 | 2016-06-02 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements |
| US20150227727A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
| US20150227728A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements |
| US10771572B1 (en) * | 2014-04-30 | 2020-09-08 | Twitter, Inc. | Method and system for implementing circle of trust in a social network |
| US9213855B1 (en) * | 2014-06-02 | 2015-12-15 | Narus, Inc. | Trusted user circles |
| US20230247003A1 (en) | 2014-06-20 | 2023-08-03 | Zscaler, Inc. | Zero trust private application access for government applications |
| US20160013966A1 (en) * | 2014-07-11 | 2016-01-14 | Microsoft Technology Licensing, Llc | Device Circles |
| US20160055324A1 (en) * | 2014-08-20 | 2016-02-25 | Motorola Mobility Llc | Context-Based Authentication Mode Selection |
| US9608964B2 (en) * | 2015-02-23 | 2017-03-28 | PrivApp, Inc. | Private application platform |
| US10110569B1 (en) * | 2015-04-08 | 2018-10-23 | CSuite Technologies, Inc. | Systems and methods of storing data on a cloud-based personal virtual server |
| US20180077745A1 (en) * | 2015-04-15 | 2018-03-15 | Nec Corporation | Method for coordinating terminal-to-terminal communication via ad-hoc network and mobile communication network, and management server device in which said method is implemented |
| US20160373352A1 (en) * | 2015-06-17 | 2016-12-22 | Brocade Communications Systems, Inc. | Configuration of load-sharing components of a network visibility router in a network visibility system |
| US20160373932A1 (en) * | 2015-06-19 | 2016-12-22 | Apple Inc. | Electronic subscriber identity module management under multiple certificate authorities |
| US10701044B2 (en) * | 2015-06-26 | 2020-06-30 | Micro Focus Llc | Sharing of community-based security information |
| US10693914B2 (en) * | 2015-06-26 | 2020-06-23 | Micro Focus Llc | Alerts for communities of a security information sharing platform |
| US20190251765A1 (en) * | 2015-08-11 | 2019-08-15 | Schweitzer Engineering Laboratories, Inc. | Policy-managed physical access authentication |
| US20170093829A1 (en) * | 2015-09-25 | 2017-03-30 | Mcafee, Inc. | Cumulative authentication for step-up increased authentication factors |
| US20170093899A1 (en) * | 2015-09-29 | 2017-03-30 | International Business Machines Corporation | Crowd-based detection of device compromise in enterprise setting |
| US20170111364A1 (en) * | 2015-10-14 | 2017-04-20 | Uber Technologies, Inc. | Determining fraudulent user accounts using contact information |
| US20240244068A1 (en) * | 2015-10-28 | 2024-07-18 | Qomplx Llc | System and methods for detecting authentication object forgery or manipulation attacks |
| US20170124506A1 (en) * | 2015-10-30 | 2017-05-04 | Zemcar, Inc. | Rules Based Driver Selection |
| US20170171231A1 (en) * | 2015-12-11 | 2017-06-15 | Brightpoint Security, Inc. | Computer Network Threat Assessment |
| US20240098097A1 (en) * | 2015-12-22 | 2024-03-21 | Mcafee, Llc | Secure over-the-air updates |
| US20180278600A1 (en) * | 2016-01-19 | 2018-09-27 | Regwez, Inc. | Multi-factor masked access control system |
| US20200196378A1 (en) * | 2016-03-18 | 2020-06-18 | Parallel Wireless, Inc. | Base Station Grouping for Topology Hiding |
| US20170331826A1 (en) * | 2016-05-11 | 2017-11-16 | International Business Machines Corporation | Hybrid database access control in external-to-database security systems |
| US20190312871A1 (en) * | 2016-05-18 | 2019-10-10 | Salesforce.Com, Inc. | Environment-differentiated named credential instances for development and deployment |
| US20170346823A1 (en) * | 2016-05-25 | 2017-11-30 | Bank Of America Corporation | Network of trusted users |
| US20180012433A1 (en) * | 2016-07-07 | 2018-01-11 | NextEv USA, Inc. | Vehicle identification or authentication |
| WO2018069566A1 (en) * | 2016-10-14 | 2018-04-19 | Nokia Technologies Oy | Method, device and system for validating sensitive user data transactions within trusted circle |
| US20180121646A1 (en) * | 2016-11-01 | 2018-05-03 | Ricoh Company, Ltd. | Information processing device, information processing system, and information processing method |
| US20180131692A1 (en) * | 2016-11-09 | 2018-05-10 | Idefend Ltd. | System and a method for applying dynamically configurable means of user authentication |
| US20180129797A1 (en) * | 2016-11-10 | 2018-05-10 | EyeVerify Inc. | Verified and private portable identity |
| US20180150890A1 (en) * | 2016-11-28 | 2018-05-31 | Sap Se | Trust circle through machine learning |
| US10673862B1 (en) * | 2016-12-07 | 2020-06-02 | Amazon Technologies, Inc. | Token-based access tracking and revocation |
| US20180191501A1 (en) * | 2016-12-31 | 2018-07-05 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
| US20220166883A1 (en) * | 2017-01-20 | 2022-05-26 | Virtual Hold Technology Solutions, Llc | System and method for enhanced virtual queuing |
| US20180309570A1 (en) | 2017-04-21 | 2018-10-25 | Netgear, Inc. | Secure communication in network access points |
| US20180324197A1 (en) * | 2017-05-03 | 2018-11-08 | Servicenow, Inc. | Aggregating network security data for export |
| US20180324207A1 (en) * | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
| US20180332065A1 (en) * | 2017-05-11 | 2018-11-15 | International Business Machines Corporation | Authenticating an unknown device based on relationships with other devices in a group of devices |
| US20180332017A1 (en) * | 2017-05-11 | 2018-11-15 | International Business Machines Corporation | Authenticating a device based on communication patterns in a group of devices |
| US20180337911A1 (en) * | 2017-05-16 | 2018-11-22 | Apple Inc. | Techniques for verifying user intent and securely configuring computing devices |
| US20190013948A1 (en) * | 2017-07-07 | 2019-01-10 | Microsoft Technology Licensing, Llc | Internet of things blockchain interface |
| US20190058992A1 (en) * | 2017-08-17 | 2019-02-21 | Bank Of America Corporation | Multifactor network authentication |
| US20190058702A1 (en) * | 2017-08-17 | 2019-02-21 | Bank Of America Corporation | Self-adjusting multifactor network authentication |
| US11095662B2 (en) * | 2017-08-29 | 2021-08-17 | Amazon Technologies, Inc. | Federated messaging |
| US20190109839A1 (en) * | 2017-10-06 | 2019-04-11 | Bank Of America Corporation | Multi-level authentication system with persistent integration platform |
| US10164982B1 (en) * | 2017-11-28 | 2018-12-25 | Cyberark Software Ltd. | Actively identifying and neutralizing network hot spots |
| US20190281465A1 (en) * | 2017-12-04 | 2019-09-12 | Kevin K Moshir | Blockchain for validating communications archiving |
| US20190199813A1 (en) * | 2017-12-22 | 2019-06-27 | CircleIt LLC | Method and system for scheduling, indexing, categorizing, and triggering digital content and gifts for future delivery |
| US20200412541A1 (en) * | 2018-01-27 | 2020-12-31 | Redrock Biometrics Inc | Authentication ledger interactions for decentralized biometric authentication |
| US20190272361A1 (en) * | 2018-03-01 | 2019-09-05 | Bank Of America Corporation | System and method for continuous and competitive authentication |
| US20190311791A1 (en) * | 2018-04-04 | 2019-10-10 | Healthcard LLC | System and method for patient-centric universal health recording and payment |
| US20190335002A1 (en) * | 2018-04-26 | 2019-10-31 | Verizon Patent And Licensing Inc. | Programmable user plane function |
| US20190342298A1 (en) * | 2018-05-02 | 2019-11-07 | Samsung Electronics Co., Ltd. | System and method for resource access authentication |
| US11412003B1 (en) * | 2018-05-07 | 2022-08-09 | Amrock, Llc | Resource protection and verification with bidirectional notification architecture |
| US20190349469A1 (en) * | 2018-05-08 | 2019-11-14 | Apple Inc. | Managing device usage |
| US20190378078A1 (en) * | 2018-06-11 | 2019-12-12 | Intyrn Inc | Task delegation system |
| US20200007530A1 (en) * | 2018-06-28 | 2020-01-02 | Oracle International Corporation | Session Synchronization Across Multiple Devices in an Identity Cloud Service |
| US20200004520A1 (en) * | 2018-06-29 | 2020-01-02 | Alibaba Group Holding Limited | One Click Application Asset Distribution |
| US20200021591A1 (en) * | 2018-07-11 | 2020-01-16 | Cyberark Software Ltd. | Automated creation of dynamic privileged access resources |
| US20200052882A1 (en) * | 2018-08-10 | 2020-02-13 | International Business Machines Corporation | Secure environment device management |
| US20200074333A1 (en) * | 2018-08-30 | 2020-03-05 | Conduent Business Services, Llc | Method and system for dynamic trust model for personalized recommendation system in shared and non-shared economy |
| US20200117442A1 (en) * | 2018-10-10 | 2020-04-16 | Digital Alert Systems, Inc. | Method, system and program product for monitoring and managing emergency alert system devices |
| US20220012256A1 (en) * | 2018-10-10 | 2022-01-13 | Digital Alert Systems, Inc. | Method, system and program product for monitoring eas devices |
| US20200145425A1 (en) | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for continuous authentication |
| US20220150313A1 (en) * | 2018-12-10 | 2022-05-12 | Parallels International Gmbh | System and method for remote application sharing |
| US12170669B2 (en) * | 2018-12-11 | 2024-12-17 | Visa International Service Association | Trust tokens for resource access |
| US11997219B1 (en) * | 2019-02-25 | 2024-05-28 | United Services Automobile Association (Usaa) | Network security for remote workers |
| US11886607B1 (en) * | 2019-03-14 | 2024-01-30 | Change Healthcare Holdings, Llc | Apparatus and method configured to facilitate the selective search of a database |
| US20200322321A1 (en) * | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Continuous trust score |
| US20200322330A1 (en) | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Continuous multi-factor authentication system |
| US20200322169A1 (en) * | 2019-04-08 | 2020-10-08 | Cisco Technology, Inc. | Accountable identities on the internet |
| US20200382323A1 (en) * | 2019-06-03 | 2020-12-03 | Intuit Inc. | Centralized authentication and authorization with certificate management |
| US20200395107A1 (en) * | 2019-06-11 | 2020-12-17 | International Business Machines Corporation | Secure environment device management |
| US10963842B1 (en) * | 2019-06-20 | 2021-03-30 | Intuit Inc. | Communication platform for email management |
| US20190325154A1 (en) * | 2019-06-28 | 2019-10-24 | Sudeep Divakaran | Hardware-assisted privacy protection using a secure user interface with multi-level access control of sensor data |
| US20210004454A1 (en) * | 2019-07-07 | 2021-01-07 | Apple Inc. | Proof of affinity to a secure event for frictionless credential management |
| US11483316B1 (en) * | 2019-07-11 | 2022-10-25 | Workday, Inc. | System and method for access using a circle of trust |
| US11539533B1 (en) * | 2019-07-11 | 2022-12-27 | Workday, Inc. | Access control using a circle of trust |
| US20210036865A1 (en) * | 2019-07-29 | 2021-02-04 | International Business Machines Corporation | Automatic form completion from a set of federated data providers |
| US11838762B1 (en) | 2019-08-04 | 2023-12-05 | Secureauth Corporation | Method and system for identity verification and authorization of request by checking against an active user directory of identity service entities selected by an identity information owner |
| US20210124817A1 (en) * | 2019-10-25 | 2021-04-29 | EMC IP Holding Company LLC | Human trust api in a data confidence fabric |
| US11743256B1 (en) * | 2019-11-05 | 2023-08-29 | Shape Security, Inc. | Security measures for extended sessions using multi-domain data |
| US20210160261A1 (en) * | 2019-11-21 | 2021-05-27 | International Business Machines Corporation | Device agnostic discovery and self-healing consensus network |
| US10951606B1 (en) | 2019-12-04 | 2021-03-16 | Acceptto Corporation | Continuous authentication through orchestration and risk calculation post-authorization system and method |
| US20210173910A1 (en) * | 2019-12-06 | 2021-06-10 | Bank Of America Corporation | Thermally enriched multi-modal and multi-channel biometric authentication |
| US20210218732A1 (en) * | 2020-01-09 | 2021-07-15 | Bank Of America Corporation | Client Side OTP Generation Method |
| US20210226944A1 (en) | 2020-01-22 | 2021-07-22 | Cisco Technology, Inc. | Method to bind a user and its devices: context fusion |
| US20210306456A1 (en) * | 2020-03-24 | 2021-09-30 | Vamsee Dheeraj Kanagala | Intelligent telephone call blocking and management |
| US20210374709A1 (en) * | 2020-05-29 | 2021-12-02 | Apple Inc. | Creation of restricted mobile accounts |
| US20210377056A1 (en) * | 2020-05-29 | 2021-12-02 | Apple Inc. | Secure sharing of credential information |
| US20210385202A1 (en) * | 2020-06-04 | 2021-12-09 | Caliola Engineering, LLC | Secure wireless cooperative broadcast networks |
| US20210392048A1 (en) * | 2020-06-12 | 2021-12-16 | Strata Identity, Inc. | Systems, methods, and storage media for controlling identity information across multiple identity domains in a distributed identity infrastructure |
| US20220014359A1 (en) * | 2020-07-07 | 2022-01-13 | Curity Ab | Login and consent methodology that follows rest principles and uses the oauth protocol with attested clients |
| US20220067669A1 (en) * | 2020-09-01 | 2022-03-03 | International Business Machines Corporation | Predictive device maintenance |
| US20220078194A1 (en) * | 2020-09-08 | 2022-03-10 | Micro Focus Llc | Dynamic level authentication/encryption |
| US20220075695A1 (en) * | 2020-09-09 | 2022-03-10 | Thales Dis Usa, Inc | Backup and recovery of private information on edge devices onto surrogate edge devices |
| US20220085984A1 (en) * | 2020-09-14 | 2022-03-17 | Amir Keyvan Khandani | Methods and apparatus for randomized encryption, with an associated randomized decryption |
| US20220095116A1 (en) * | 2020-09-22 | 2022-03-24 | Apple Inc. | Device communication through high-frequency light encoding |
| US20220094722A1 (en) * | 2020-09-24 | 2022-03-24 | Avaya Management L.P. | Methods and systems for maintaining conditional communication sessions using terminable authentication signals |
| US20220103568A1 (en) * | 2020-09-30 | 2022-03-31 | Denso Corporation | Authentication management method, authentication management program, and user authentication management device |
| US20220138692A1 (en) * | 2020-10-29 | 2022-05-05 | Medecision, Inc. | System and method for virtual project visits |
| US20220210173A1 (en) | 2020-12-31 | 2022-06-30 | Fortinet, Inc. | Contextual zero trust network access (ztna) based on dynamic security posture insights |
| US20220245222A1 (en) * | 2021-02-04 | 2022-08-04 | Dell Products L.P. | Baseboard management controller firmware security system |
| US20220337631A1 (en) | 2021-04-15 | 2022-10-20 | Anamika Bhattacharya | System and method to create zero trust framework for security as a service |
| US20220360607A1 (en) * | 2021-05-10 | 2022-11-10 | Island Technology, Inc. | Enterprise browser system |
| US20220398319A1 (en) * | 2021-06-14 | 2022-12-15 | Dell Products, L.P. | Custom baseboard management controller (bmc) firmware stack monitoring system and method |
| US20220406304A1 (en) * | 2021-06-21 | 2022-12-22 | Kyndryl, Inc. | Intent driven voice interface |
| US20230170956A1 (en) * | 2021-12-01 | 2023-06-01 | Qualcomm Incorporated | Secret key extraction for line-of-sight communications |
| US20230179605A1 (en) * | 2021-12-03 | 2023-06-08 | Whatsapp Llc | Providing equal signing authority between multiple devices of a single user in an end-to-end encrypted messaging system |
| US20230222047A1 (en) * | 2022-01-11 | 2023-07-13 | International Business Machines Corporation | Methods and systems for managing as-a-service systems in the event of connectivity issues |
| US20230244775A1 (en) * | 2022-01-31 | 2023-08-03 | Salesforce.Com, Inc. | Verification of Automatic Responses to Authentication Requests on Authorized Mobile Devices |
| US20230300930A1 (en) * | 2022-01-31 | 2023-09-21 | Kyndryl, Inc. | Cognitive hotspot provisioning and network prioritization |
| US20230251936A1 (en) * | 2022-02-10 | 2023-08-10 | Vinpower Inc. | Mobile device for protecting data stored in data backup device and data protection method thereof |
| US20230306428A1 (en) * | 2022-03-24 | 2023-09-28 | Bank Of America Corporation | Multi-Computer System with Dynamic Authentication for Optimized Queue Management Based on Facial Recognition |
| US20240314551A1 (en) * | 2022-05-07 | 2024-09-19 | Nokia Technologies Oy | Security communication in prose u2n relay |
| US20230379319A1 (en) * | 2022-05-20 | 2023-11-23 | Cisco Technology, Inc. | Secure access service edge function with configured metric collection intelligence |
| US20230379350A1 (en) | 2022-05-20 | 2023-11-23 | Cisco Technology, Inc. | Continuous trusted access of endpoints |
| US20230384996A1 (en) * | 2022-05-31 | 2023-11-30 | Sharp Kabushiki Kaisha | Image forming apparatus and determination method in processing apparatus |
| US20240040383A1 (en) | 2022-07-29 | 2024-02-01 | Cisco Technology, Inc. | Trust based continuous 5g service assessment |
| US20240073251A1 (en) * | 2022-08-25 | 2024-02-29 | Capital One Services, Llc | Authentication based on detection of user-specific authentication input errors |
| US20240098577A1 (en) * | 2022-09-19 | 2024-03-21 | Qualcomm Incorporated | Techniques for connected state mobility in a service-based wireless system |
| US20240152857A1 (en) * | 2022-11-04 | 2024-05-09 | Project44, Llc | Analyzing and Managing Shipping Data Across Jurisdictions and Regions |
| US20240243904A1 (en) * | 2023-01-12 | 2024-07-18 | nTropy.io, Inc. | File construct for internet-of-things key material |
| US20240273066A1 (en) * | 2023-02-15 | 2024-08-15 | Varonis Systems, Inc. | Optimized file classification with supervised learning |
| US20240281796A1 (en) * | 2023-02-17 | 2024-08-22 | Artema Labs, Inc | Systems and Methods for Facilitating Digital Wallet-Based Transactions |
| US20240323034A1 (en) * | 2023-03-24 | 2024-09-26 | Srinivas Kumar | System and method for extended attributes in certificates for dynamic authorization |
| US20240364730A1 (en) * | 2023-04-25 | 2024-10-31 | Ping Identity International, Inc. | Access prediction service serving explainable risk scores |
| US20240378423A1 (en) * | 2023-05-08 | 2024-11-14 | ForgeRock, Inc. | Explainable neural network for anomaly detection |
| US20240380575A1 (en) * | 2023-05-09 | 2024-11-14 | Apple Inc. | Server-Mediated Management of Accessory Device Sharing |
| US20240414061A1 (en) * | 2023-06-06 | 2024-12-12 | Vmware, Inc. | Conflict resolution between global and local network managers in a virtualized computing system |
| US11936671B1 (en) | 2023-06-26 | 2024-03-19 | Kolide, Inc. | Zero trust architecture with browser-supported security posture data collection |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2026015803A1 (en) * | 2024-07-12 | 2026-01-15 | Cortwo Corp. | Continuous universal trust architecture and method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12316672B2 (en) | Bot detection in an edge network using transport layer security (TLS) fingerprint | |
| US11558484B2 (en) | Systems and methods for secure peer-to-peer caching | |
| EP3742289B1 (en) | Virtual delivery appliance with remote authentication and related methods | |
| US9531714B2 (en) | Enterprise authentication via third party authentication support | |
| US20200004946A1 (en) | Secretless and secure authentication of network resources | |
| US9860249B2 (en) | System and method for secure proxy-based authentication | |
| US10230725B2 (en) | Edge protection for internal identity providers | |
| US11831646B2 (en) | Authentication for secure file sharing | |
| US9497197B2 (en) | Systems and methods for secure resource access and network communication | |
| CN104253812B (en) | Entrust the certification for WEB service | |
| US8832857B2 (en) | Unsecured asset detection via correlated authentication anomalies | |
| US9813421B2 (en) | Systems and methods for secure resource access and network communication | |
| US10243953B2 (en) | Systems and methods for secure resource access and network communication | |
| US12101319B2 (en) | Computing session multi-factor authentication | |
| JP2014529272A5 (en) | ||
| US12341776B2 (en) | Service to service communication and authentication via a central network mesh | |
| US10897458B1 (en) | Enhancing secure client experience through selective encryption of cookies | |
| US12309132B1 (en) | Continuous universal trust architecture and method | |
| US10341345B1 (en) | Network browser configuration | |
| US20260019409A1 (en) | Continuous universal trust architecture and method | |
| US20240275819A1 (en) | Secure system for hiding registration rules for dynamic client registration |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |